Protecting valuable assets requires a layered security approach. Consider that when historic sites and museums implement security plans to protect priceless treasures, their plans go far beyond simply locking their doors at the end of the day. Rather, they employ a layered security approach that includes 24x7 security...
While security attacks on big businesses dominate the headlines, midsized organizations are a highly attractive target for cyber criminals. Unlike large enterprises that have large IT departments with dedicated teams focused solely on security, midsized organizations must protect a growing amount of valuable...
When a user logs in to your web applications, are you sure she is who she claims to be? And are you sure the social media site and the phone she is using for access are secure? Or have they been compromised to steal information? As enterprises begin to open their IT systems to a larger number of consumers, employees...
The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.
The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
When it comes to mobility, business decision-makers (the senior executives, VPs of marketing and sales and so on) are focused on how to make the most of it. How to allow more workers to perform higher-value tasks from anywhere, at any time. How to keep workflows moving. How to provide more immediate results for...
CIOs make tough decisions every day. To make the right ones, you have to trust your sources and be confident that you're prioritising the right issues. Enterprise Mobility Management (EMM) is top of mind for most CIOs today, not just because of BYOD and COPE (Corporate Owned, Personally Enabled), but also because of...
Government organizations and their agencies, partners and suppliers are under intense pressure to wring maximum value from taxpayers' money - which means tapping into new tools that can help increase productivity, drive efficiency, improve service and cut costs. Innovation in the mobile space has created a host of new...
Operating in a regulated industry, like healthcare, adds a layer of complexity to many things - including mobility. While enterprises in other industries may be concerned about security - health-related organizations and their business associates are obliged by law to conform to detailed rules around storing and...
Like business leaders in every industry, decision makers in Financial Services (FS) organizations are increasingly turning to mobility to deliver on strategic objectives.
They understand that mobilising business processes can help improve customer satisfaction and response times, boost employee productivity, increase...
The mobility needs of both IT administrators and end users are rapidly evolving. In many ways, those needs appear to be at odds. Users want to get more done on the move, with less interference from administrators. IT, on the other hand, has to deal with incredibly complex security concerns, from the latest mobile...
As enterprises mobilize business processes, more and more sensitive data passes through and resides on mobile devices.
And while almost every CIO knows how important mobile security is, getting a grip on it can be tough. There's a lot to consider, and new factors enter the equation all the time.
Download this...
If you're in IT, whatever your role or seniority level, you know that security matters in Enterprise Mobility Management (EMM). And you don't need another reminder:
they spring up every time you catch up on industry news. Another breach. Another hack. Another brand struggling to minimise the damage. You hope it never...
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.