The threat landscape certainly has changed in recent years. But can you say the same about the traditional intrusion prevention system."The biggest problem with IPSs today is that organizations are trying to fight today's threats with yesterday's solutions," says Bertone, who serves as CTO of Fidelis Cybersecurity....
Cyber espionage groups are using unconventional channels to hack target organizations, according to Mandiant' s latest research. Trusted service provider relationships are being exploited to compromise organizations in government and defense, says Rob van der Ende, Mandiant's vice president for Asia Pacific and Japan.
Unprecedented hack attacks knocked three Ukrainian power providers offline in late 2015, and now a potential repeat hack has surfaced. Security experts recommend all power operators globally hunt carefully for related signs of attack.
In online banking security, consumer endpoints are commonly considered the "weak link," and for good reason. Banks have no control over their customers' endpoints or the steps their customers take to reduce their risk. To make matters worse, fraudsters now regularly circumvent traditional endpoint protections, such as...
Eighty-eight percent of citizens polled in a CDG survey say online government services are easy to use, while 87 percent of business owners and managers say they make it easier to do business with state governments. 24/7 government is ubiquitous - it's working, and it's working well. However, the transition to a...
Same-day Automated Clearing House (ACH) payment processing became a reality. While this represents a terrific opportunity for banks to be responsive to their customer's requirements for faster ACH payments, plus the ability to attract new customers from banks who choose not to offer the same level of responsiveness,...
CISOs face the continuing challenge of how to clearly communicate information security risk to the board and senior management. But now they can take advantage of a free metrics framework designed to help evaluate an organization's cybersecurity readiness. Phil Cracknell of ClubCISO describes the effort.
While enterprises rebuild or upgrade their security programs, they must guard against over emphasizing technology investments while neglecting staffing issues, says Ben Johnson, chief security strategist at Carbon Black.
Banks spend billions of dollars in defensive measures trying to detect fraudulent transactions and recover funds before they disappear. However, given the increasing sophistication of malware and phishing attacks, and the growing number of threats, many banks are finding that traditional endpoint protections, such as...
As many as 250,000 credentials for Remote Desktop Protocol servers around the world may have been offered for sale on the now-shuttered xDedic cybercrime marketplace. So what can organizations do to mitigate related risks and avoid a major network intrusion?
Cyber security breaches are more common now than they have ever been. While they don't all make news headlines,
they affect numerous businesses every single day.
What exactly are these threats? How are they carried out and how can they impact business?
Download this guide to explore the top five most common...
Traffic from command-and-control (C2) servers
is an indication of attack risk or compromise
potential. Tracking live C2 data reveals victim
hotspots and activity hubs for malicious actors.
Level 3 has a point of presence (PoP) in more
than 30 European countries and continually
monitors Internet traffic for...
Are you making the most of all the intelligence available to you today? What are the practical aspects of plugging abstract threat intelligence into your specific business use cases? Deloitte's Parthasarathy shares deeper insight.
We hear a lot about security in regulated verticals such as financial services and telecom. But what are some of the challenges unique to manufacturing? Tata Motor's CISO Uday Deshpande shares insight and recommendations.
Learn how Financial Services organizations have moved from trustbased
exercises, to
evidencebased,
continuous monitoring of vendor security.
The Financial Services industry has long been a pioneer in developing risk management
practices. As third party data breaches have increased in recent years, regulators...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.