Most financial institutions used to allow customers to log in to their accounts with a simple username and password. But passwords are notoriously insecure - many users choose weak passwords that can be easily guessed or cracked. In an effort to help strengthen security, large numbers of banks began using a second...
FireEye just released a report called "APT30 AND THE MECHANICS OF A LONG-RUNNING CYBER ESPIONAGE OPERATION" .The report focuses on a targeted threat group that we call APT30 (Advanced Persistent Threat group 30) and details how a cyber-threat group exploited Governments and commercial entities across India and...
Mark Clancy, CEO of Soltra, which provides an automated information sharing platform, says banks and credit unions that don't share threat intelligence will never advance their information risk management practices.
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.
Collaboration is a critical investment for many organizations looking to drive competitive advantage by better arming knowledge workers with information, access to expertise, and the ability to act collectively on trusted content. Forrester data shows that over 50% of organizations have implemented or are expanding...
The dynamics of the world economy and the demands on governments at all levels put increasing pressure on organizations to reduce costs while seeking new opportunities to grow and differentiate their products and services. The pervasiveness of the Internet and mobile devices is fostering multi-channel customer...
The pursuit of creating competitive differentiation and accomplishing desired outcomes, such as adding incremental value to the business, is top of mind for most organizations-both for profit and non profit. Aberdeen surveyed 585 organizations across the world as part of its September 2013 Aberdeen Business Review...
When you look at how companies value themselves and their assets over the past few decades, there's been a dramatic shift - away from a position in 1975 where the majority of company value came from tangible assets like stock, plant and machinery, facilities and so on; to the situation we have now where the majority...
Capture. This single word has gained much notoriety in recent years. The reason: the importance of capture to business processes. In particular, the notion of capturing - scanning - paper based information as early in a process as possible for a couple of reasons. The first reason is to eliminate the chance of the...
Understanding the organization's maturity level as defined in the CGOC Information Economics Process Assessment Kit is a major step forward in the journey toward achieving real information economic balance. The next is defining the requirements for a robust information lifecycle governance (ILG) solution and any...
No one intentionally creates digital debris. We document as we collaborate; we create files, backups, databases, and applications; and we store photos, music, digital training programs, logs, and reports. We create that content at that moment imbue it with value and purpose. However, as circumstances evolve,...
Banking is undergoing a massive shift that began with the automated teller machine, continued with online banking, and is now accelerating with the advent of mobile computing. It wasn't that long ago that banking customers were limited to the branch on Main Street. Teller services were confined to the 10 a.m. to 3...
Financial services firms are facing a new set of challenges and risks. In an increasingly global, mobile and connected world, customers can come from anywhere and they can leave in a heartbeat. But they are also interested in consolidating their banking wherever possible, and they expect the companies with whom they...
Information is exponentially more valuable when it is easy to access, consume and share, which is why getting the most from your enterprise content requires more than just effective management. You also need to provide your employees with a superior user experience. That's particularly true given recent trends toward...
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.eu, you agree to our use of cookies.