Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
Part1: Creating Actionable Intelligence, the Advances in Threat Information Exchange
Collecting security- and fraud-related data from multiple sources can often just result in creating a very large pool of unrelated facts. But begin to add context to that data and you now have information. Triangulate multiple pieces...
European financial services firms and law enforcement agencies have been stepping up their efforts to trade actionable intelligence and better defend themselves against emerging malware and fraud campaigns.
Fraudsters continue to make inroads against financial institutions based in the United Kingdom - and beyond - because banks aren't working together to share information about the attacks they see, according to presenters at the London Fraud Summit.
FS-ISAC has teamed up with the Depository Trust and Clearing Corp. to offer software designed to ease cyberthreat information collection and sharing, helping safeguard against cyber-attacks.
Security firms McAfee and Symantec have joined the Cyber Threat Alliance, which was launched by Fortinet and Palo Alto Networks in May as a way to share threat intelligence.
The 9/11 Commission, in its 10th anniversary report, cautions Americans and the U.S. government to treat cyberthreats more seriously than they did terrorist threats in the days and weeks before Sept. 11, 2001.
Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?
Since the beginning of web application delivery, there has been an opportunity for fraudsters to get into the middle of a transaction and impersonate the legitimate user. Since the credentials used for this fraud are valid and "expected to be under the control of the real user," this type of impersonation has been...
Users spend, on average, 82% of their mobile minutes with apps and just 18% with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development and the...
The trends impacting business today-cloud adoption, increased mobility, rise of social media and the increased amount of online data sharing- make the need for strong authentication more important than ever.
The IT department can no longer firmly establish a network perimeter and rely on simple username and...
IT and the business are being impacted by many important trends-cloud adoption, increased mobility, the rise of social media, and the increasing flow of information across the extended enterprise. The old network perimeter is no longer relevant. Today's IT must deal with highly distributed identities across the...
"Trust" does not mean giving employees unrestricted and unnecessary access to information. With the right security controls, organizations can significantly reduce their exposure to the risk of insider threats. The key is to find the right balance between employee enablement and control, while holding employees...
The traditional dangers IT security teams have been facing and overcoming for years are being replaced by a far more hazardous, insidious form of attack: the Advanced Persistent Threat (APT).
Although APTs are an emerging threat vector, their impact has already been felt in substantial ways.
This white paper...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.