For years, security leaders have struggled to find the balance between ensuring strong security and maintaining customer convenience. Benjamin Wyrick of VASCO Data Security says mobility may be the answer.
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
Researchers at Kaspersky Lab have released information on a denial-of-service bug, dubbed "Darwin Nuke," found in Apple's operating systems. Security experts weigh in with recommendations.
The Federal Deposit Insurance Corp. needs to improve the way it determines that banks are taking adequate steps to defend against cyber-attacks, a report from the FDIC inspector general office says.
New NIST guidance is aimed at helping organizations to better understand the risks associated with the information and communications technology supply chain, says Jon Boyens, a NIST senior adviser.
Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.
The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.
The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon.
Singapore-based Singtel, Southeast Asia's largest telecommunications company, has entered a definitive agreement to acquire U.S.-based managed security services company Trustwave for $810 million.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.
We all know that breaches and cybersecurity are topics of boardroom discussion. But how should security leaders present them to their boards? Jim Anderson of BAE Systems Applied Intelligence offers tips.
The RSA Conference is nearly a quarter-century old. What is the legacy of this event, and how is it flourishing in new geographic regions? Art Coviello, former chairman of RSA, reflects on the event's impact.
RSA Conference 2015 is expected to be the biggest gathering in the event's history. What's new at this year's event, and how can attendees get the most out of it? Program chair Hugh Thompson shares tips.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
The more organizations structure business and processes around online identities, the more they navigate in tricky legal waters, says attorney Tom Smedinghoff, who offers guidance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.