How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
BYOD cannot be avoided - nor should it be. The benefits to organizations, including increased agility, efficiency and collaboration, are too valuable to ignore. At the same time, organizations must appropriately secure BYOD environments against threats such as malware, theft and malicious insiders.
Read this...
New malware attacks are targeting smart phones, and experts say banking institutions aren't doing enough to detect and prevent those attacks. So where should institutions focus their tech investments in 2013?
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Trying to embrace BYOD while ensuring your employees can access all of the business apps and content they NEED on the mobile devices they WANT - without compromising security, integrity or compliance? This whitepaper explores the impact of consumerization and BYOD on modern IT departments, and the evolving...
The future of security in payments remains unclear, says Nicolas Vedrenne of the Merchant Risk Council. But international collaboration will be critical, especially as infrastructures merge.
As online threats continue to escalate, organizations need to adopt best practices in online security that can also achieve user convenience and budget constraints.
Financial institutions face similar security challenges when delivering online and mobile banking services today:
How to maintain customers'...
Third-party applications and users' risky behavior are two of mobile security's greatest enemies. But mobility expert Tom Wills says banking institutions can mitigate their risks. Here is how.
On the same day Citi's online and mobile-banking channels went down for undisclosed reasons, Homeland Security Secretary Janet Napolitano said top U.S. banks are "actively under attack."
It's difficult to know where sensitive patient information may be lurking in user files. But some healthcare organizations are finding ways to detect where the information resides so they can protect it. Find out how.
The FBI has alerted consumers about two Trojans that have compromised mobile devices running the Android operating system. But are all mobile devices at risk?
It's a trend that is storming the business world - workers using their own smartphones and tablets to access corporate data wherever they go. How can you make sure your confidential business data stay secure and accessible? It starts with a sound bring-your-own device (BYOD) policy.
Developing a clear BYOD policy...
The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices. It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening. The real...
After being criticized for how it handles incidents involving medical devices affected by information security issues, the Food and Drug Administration is planning to take action.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.