Organizations often do not detect intrusions until after they've been compromised, says Rob Lee of SANS Institute. So how should they improve their incident-response posture? Lee offers three tips.
What steps can financial institutions take now to control and enhance the security of mobile banking? Brian Pearce and Amy Johnson of Wells Fargo share some of their bank's strategies.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
New advisories from Visa suggest that payments processor Global Payments Inc. may have been breached in June 2011 - nine months earlier than initially reported.
Nearly three-quarters of surveyed professionals say concerns regarding data security prevent their organizations from adopting cloud services. And more than half of the respondents say their own services are more secure than those offered by cloud providers.
These are among the findings of the new 2012 Cloud...
The latest spin on the insider threat: malicious outsiders taking advantage of inadvertent insiders, says Dawn Cappelli of Carnegie Mellon University. Learn how to detect and prevent these attacks.
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
If you handle critical data, you've got to be humble, advises Bob Carr, CEO of breached processor Heartland Payments System. "Anyone that thinks they're not going to be breached is being naïve."
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
A security firm has uncovered a wave of fraud striking corporate checking accounts in the U.S., U.K. and China. How are the criminals gaining access to supposedly secure banking credentials?
Name.com used to block IP addresses to stop scammers, but discovered that many figured out how to get around it. They started using next generation device identification, which goes beyond browser fingerprinting to identify the device, bypass proxies and detect the use of botnets, resulting in fewer chargebacks, lower...
The cybersecurity war is fought on the new frontier of unregulated and insufficiently protected computers belonging to customers, contractors, business partners and the web applications with which they transact, login, consume and share. As cybercrime exploits become more sophisticated, defending against them requires...
Gartner fraud expert Avivah Litan shares ideas about how lessons learned from the Global Payments data breach can help security practitioners mitigate card-fraud risks and prevent future incidents.
When it comes to the FFIEC Authentication Guidance, Aite analyst Shirley Inscoe fears too many banking institutions are investing only in achieving compliance - not ongoing security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.