Symantec's 2014 Internet Security Threat Report calls 2013 the year of the mega breach. Why? Because it's getting far too easy for the bad guys to pull off these breaches, says Symantec's Kevin Haley.
To boost cybersecurity, senior leaders - whether a CEO, a board member or a government agency director - need to think of information as a critical asset worthy of protection, risk management experts Val Rahmani and Malcolm Harkins say.
Years before she helped put fraudster Albert Gonzalez behind bars, Kim Peretti was an attorney who had dual interests in law and technology. How did she channel her interests into a prominent career?
Even so-called minor breaches can cost organizations nearly $200,000, according to one finding from NTT Group's annual Intelligence Report. Rob Kraus of Solutionary shares the study's insights and advice.
Advanced threats are like the weather. Everyone talks about them, but few have a solid defense plan - or even a solid understanding of the threat landscape. Mike Nichols of General Dynamics Fidelis Cybersecurity Solutions offers insight.
(ISC)² is celebrating its silver anniversary as a global organization educating and certifying information security professionals. What are the key threats and trends driving the profession's future growth?
Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds....
Banking Trojans such as Zeus have gotten much tougher to detect because of new attack techniques, which means intrusions are going undiscovered for longer periods, says Trusteer researcher Etay Maor.
There have never been more career options for privacy professionals. But what are the essential skills and experience for advancement? Michelle Dennedy of Intel Security discusses her career path.
Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka5 discusses how to mitigate third-party risks.
As banking institutions expand their payments platforms, channel integration could help not only to ensure a consistent consumer experience but also to streamline security, says Marc West of Fiserv.
Attackers likely purchased malware in underground "cybercrime-as-a-service" markets to use in recent credit card breaches, including the Target Corp. attack, a new report from McAfee Labs asserts. Adam Wosotowsky explains the report's findings.
One key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president.
Although adoption of mobile banking is accelerating, mobile payments have yet to reach a tipping point and security issues need to be addressed, says Marc Warshawsky of Bank of America, a mobile banking pioneer.
Recent data breaches, such as the ones suffered by Target Corp. and Neiman Marcus, may have been detected sooner if retailers had been sharing transactional pattern and behavioral information about their customers, says Mike Braatz of ACI Worldwide.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.