With so many firewall options on the market today and new malware attacks launching weekly, choosing a weak firewall solution will render you as a wide open target. So, how do you avoid posting an open season sign for hackers?
In this white paper, you will learn the 10 necessary functions of a next-gen firewall to...
Securing your data centers, edge, and cloud environments is an ongoing challenge as threat landscapes continue to evolve. Traditional firewalls are no longer sufficient. What's needed is a firewall that can adapt to emerging threats in near real time, in an automated and dynamic way.
This white paper discusses the...
Delivering rapid and consistent security response is easier said than done. Discover the top issues faced by security executives in this new paper from Sr. Principal Analyst Jon Oltsik at Enterprise Strategy Group. Based on input from more than 180 security executives, this paper by ServiceNow pinpoints and examines...
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
The Commercial Bank of Ceylon has apparently been hacked, and its data has been dumped online by the Bozkurtlar hacking group that has leaked data from seven other banks in the Middle East and South Asia since April 26.
Mozilla wants the U.S. government to provide it with information about a possible unpatched vulnerability in its Firefox browser, which was used by the FBI as part of a large child pornography investigation.
The theft of $81 million from Bangladesh Bank was "part of a wider and highly adaptive campaign targeting banks," SWIFT warns its 11,000 customers. Investigators say signs point to the same attackers having hacked Sony Pictures Entertainment in 2014.
The $940 billion compensation awarded to Epic Systems in its case against Indian IT major TCS is unprecedented - shaking the industry out of its complacency to information security. Cyber law expert "Naavi" takes a close look at the implications for India.
The Obama administration has implemented a number of cybersecurity and privacy initiatives and policies aimed at making IT more secure for the federal government and the private sector, including the cybersecurity framework, National Strategy for Trusted Identities in Cyberspace, employing encryption and sharing cyber...
How Prepared Is Your Organization to Defend Against Today's Advanced Threats?
Ashley Madison, Sony, JPMorgan Chase - what's your confidence that when the next big security incident erupts, your organization will be prepared to defend itself? Are you getting the security you expect from the investment your...
Attackers have been exploiting separate zero-day vulnerabilities in Internet Explorer and the Flash browser plug-in software. But while Microsoft has patched IE, Adobe's Flash fix remains forthcoming.
The same Turkish hacking group that recently leaked data from Qatar National Bank and UAE's InvestBank apparently has leaked data that appears to belong to five banks in Nepal and Bangladesh. But are the leaks the result of new breaches?
It's one thing to talk or even plan about "What happens if we are breached?" It's quite another to undertake a true breach exercise. What are the critical elements of such a drill? Author Regina Phelps shares advice from her new book.
Ninety-nine percent of the enterprise workforce currently uses mobile devices smart phones and tablets to perform their jobs today. And nearly 60 percent of security leaders describe their organizations as either partially or fully mobile, deriving enhanced productivity and other business benefits. These are among...
The Defense Advanced Research Projects Agency has awarded Georgia Tech a $2.9 million grant to develop a process for quickly identifying and then defending against low-volume DDoS attacks, which are far more common than high-volume attacks but can be just as disruptive.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.