Companies developing their own mobile applications must take steps to ensure their security policies are followed no matter where or how the apps are used, says Kurt Stammberger of Mocana Corp.
Even the brightest technologists aren't immune from cyber-attacks. Just ask Facebook. The social-media company says it fell victim to a sophisticated attack in which an exploit allowed malware to be installed on employees' laptops.
Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
The FFIEC has issued proposed risk management guidance for the use of social media. Find out about the key recommendations, and why experts say the guidance could prove valuable to banking institutions.
Employees are using a range of new web-based applications to get their jobs done and you've got limited visibility, let alone control. But one thing is certain - many of these applications are evasive and firewall aware and hackers are using them to penetrate networks.
How do you encourage productivity and minimize...
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
The biggest social media concern for risk managers is the potential reputational impact to the organization, says risk expert David Bradford, who outlines mitigation steps.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.
The Zeus Trojan is frightening because of its agility, evolution and success at stealing banking credentials. How can institutions fight back? Malware expert Andreas Baumhof offers new ideas.
LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
Which Internet security threats pose the greatest risks to organizations in 2012 and beyond? Symantec has just released its Internet Security Threat Report, which reveals some surprising trends.
The ECRI Institute recently published a report on controlling the risks involved in using social media in healthcare. Read on to discover insights on how to address risks and prevent breaches.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.