Your organization has been attacked or threatened, and you can trace the actor. Should you "hack back" in response? Two noted information security and privacy attorneys discuss the merits of active defense.
Today's high-profile attacks have fundamentally changed the way organizations approach incident response. What are the new essentials? Ashar Aziz of FireEye leads a panel discussion on this vital topic.
CISOs looking for a way to build credibility with senior executives - and win funding for important projects - need to drop the "just say no" approach and build a reputation as a team player, says security professor Ray Davidson.
Our RSA panel features the NIST thought-leader responsible for its information risk publications along with top IT security practitioners who take NIST guidance and make it work. See how they do it.
The National Credit Union Administration is the second federal regulator to issue a warning about fraud risks linked to DDoS. One legal expert says banking institutions must heed the warning.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
Seven banking institutions that are seeking recovery of losses suffered after Heartland's 2008 breach have appealed a lower court's dismissal of their negligence claims against the N.J. processor.
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
Bashas' network attack highlights how PCI compliant companies can still be breached. So what steps should merchants take to ensure better security, and how should banks help them?
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
Some of the largest banks in the U.S. were unable to ward off sophisticated DDoS attacks, so what can smaller organizations do? Plenty, says Marty Meyer, President of Corero Network Security.
"We simply did not follow the best practices we recommend to our customers by making certain our product was on all physical and virtual machines within Bit9," says Chief Executive Patrick Morley.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
The Federal Reserve confirms it's been breached. What message does this attack send to banking institutions and their vendors about the heightened urgency to implement security best practices?
The compromise of hundreds of payment cards, apparently tied to fraud worldwide, has been linked to a network hack affecting an Arizona supermarket chain. And the attack involved a new kind of malware, the chain says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.