Starting with the 2007-9 financial crisis, which exposed the fallacy in the idea that any market participant is "too big to fail", banks and their traders have recognized a need to get smarter about counterparty credit risk. As a result, concepts such as credit valuation adjustment (CVA) have evolved from a useful...
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. While some companies have met their risk and compliance challenges head on with insightful business strategies and powerful technology solutions, many are...
The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of...
Exploiting vulnerabilities in applications, browsers, and operating systems is often the first step in compromising a target. But despite increased investment, security and risk professionals continue to struggle with remediation. A new analyst report takes a look at the current state of vulnerability risk...
Today's constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the...
More and more companies today are finding themselves under a multitude of common and advanced malware attacks. As a security professional or IT manager, you are likely struggling to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.
With the Cisco® Advanced...
It is not too far when most enterprises will experience doomsday scenarios, as cyber threats are only increasing faster than the ability to implement security improvements. One cannot deny the fact that even those organizations employing good cyber practices are being penetrated, as hackers are getting more...
Despite advances by the security industry, criminals continue to break through security defenses. And attackers now realize that bigger and bolder attacks are not always better. New threat intelligence and trend analyses reveal how attackers take advantage of the gaps between the defenders' intent and action.
The...
Cisco AMP Threat Grid combines static and dynamic malware analysis with threat intelligence into a single, unified solution. It integrates real-time behavioral analysis and up-to-the-minute threat intelligence feeds with existing security technologies, protecting you from both known and unknown attacks.
Download...
Organizations constantly faces security issues as the workforce, technologies, and regulations change. And, as network perimeters dissolve, security considerations and concerns change. With more devices accessing your network, is your corporate mobile device security policy adequate and effective?
The Cisco®...
Mobile capture is quickly becoming an important differentiator for many companies and organizations, especially those in traditionally document-intensive fields like banking, insurance, healthcare and government operations. According to a 2014 study conducted by AIIM, 45% of companies feel that mobile capture is...
The regulatory environment means that monitoring what information leaves your organization is as vital as protecting it from external attacks. Email is one of the most likely routes by which data may leak, maliciously or more often accidentally. A successful Data Leak Prevention system will address the issue of email...
Organizations collect a wealth of information as part of their governance, risk and compliance programs, and security professionals are missing out on important insights if they don't take advantage of it.
Governance, Risk and Compliance (GRC) represents a business oriented approach to establishing ownership and accountability throughout the organization to improve decision making.
While this may seem straightforward, establishing a GRC program within an organization is not a simple task. It is also not a new...
Organizations generally do a good job focusing on governance, risk and compliance. But breaches add up, and LockPath CEO Chris Caldwell wonders "Where is the 'S' in GRC?" - where is the security?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.