Once again, a supposedly secure service allegedly marketed to criminals has proven to have limits. Dutch police have busted a "cryptophone" operation, allowing them to decrypt more than 258,000 encrypted chat messages, leading to a drug lab bust, 14 arrests and the seizure of cash, drugs and weapons.
In this report we analyze real-world end-user vulnerability assessment (VA) behavior using a machine learning (ML)
algorithm to identify four distinct strategies, or "styles." These are based on five VA key performance indicators (KPIs)
which correlate to VA maturity characteristics.
This study specifically focuses...
As the modern attack surface rapidly expands, companies must get the basics right. Yet each time a data security breach hits the news, there are reactionary questions are what could have been done to avoid the problem. More often than not these incidents occur because organizations commonly overlook basic security...
When it comes to IT infrastructure, it's fair to say the perimeter has left the premises. In fact,
the perimeter has mostly disappeared. We are living in a new reality, one crowded with new types of dynamic IT assets.
Whether
it's discovering short-lived assets like containers, assessing the state of cloud...
This 2018 Osterman Research Survey Report focused on understanding current security processes and how organizations are working to improve and automate them.
The research was conducted in the US, EMEA and APAC regions with 465 professional respondents who were knowledgeable about security policy management in their...
As application development teams strive to deploy features and changes into production as quickly as possible, an organization must rapidly adapt to ensure it's security posture is maintained yet doesn't slow down the build-to-deploy pipelines. The power of Kubernetes and Deep Security Smart Check together reduce the...
Digital transformation (DX) continues to drive growth across financial services firms, creating new opportunities to increase revenue and foster innovation. Cloud - whether public, private or a hybrid approach - is foundational to achieving DX objectives, as is secure, resilient and scalable network connectivity....
As application development teams strive to deploy features and changes into production as quickly as possible, an organization must rapidly adapt to ensure it's security posture is maintained yet doesn't slow down the build-to-deploy pipelines. The power of Kubernetes and Deep Security Smart Check together reduce the...
HSBC Bank is warning some of its U.S. customers that their personal data was compromised in a breach, although it says it's detected no signs of fraud following the "unauthorized entry." Security experts say the heist has all the hallmarks of a credential-stuffing attack campaign.
Pakistan says the nation's banks have not been hacked, but adds that they are taking defensive steps after nearly 20,000 payment card details appeared for sale online. The State Bank of Pakistan says banks are implementing restrictions on international transactions.
Georgia quietly fixed two flaws in its voter registration website that could have exposed personal information. How the secretary of state's office discovered the flaws and reacted suggests it may have erred when making a sensational accusation against the Democrats on the eve of the U.S. midterm elections.
As we approach 2019, is it realistic to think the end of our dependency on traditional user names and passwords is in sight? Shane Weeden, and authentication expert with IBM Security, discusses the future of authentication and why he's encouraged by the FIDO2 initiative.
If you're dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you're probably considering some form of software-defined wide area networking (SD-WAN).
With the variety of constraints that you face, selecting the right SD-WAN solution for...
The traditional WAN is no longer an effective solution for today's
distributed enterprise. Organizations are overcoming significant
security and network issues by moving to SD-WAN. There are
many different SD-WANs on the market today, and IT professionals should
carefully review their options so they are not...
Most organizations are undergoing some form of digital transformation (DX), transforming how they bring products and services to the market - and deliver value to their customers. But DX initiatives bring complexity for network operations teams. With business-critical services distributed across multiple clouds, this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.