Today's business climate is one of unprecedented regulatory growth, data complexity and cybersecurity concerns. There is a corresponding increase in media attention, customer awareness and Board-level scrutiny. Organizations must demonstrate that they have a viable process for managing risk and compliance (broadly...
The ongoing struggle to protect sensitive credit card data will continue to escalate. One of the requirements used to tackle this problem is the Payment Card Industry Data Security Standard (PCI DSS). However, one of the biggest challenges for PCI DSS compliance initiatives is treating the standard as a unique and...
As enterprises continue to outsource more aspects of their operations to third parties, they expose themselves to more shared risk. It can be a staggering responsibility. Most organizations understand the need to automate vendor risk management activities to keep up with increasing scope and scrutiny. Yet they...
In today's global marketplace, business leaders must not only deal with well-understood challenges - competition, increasing regulation and sustained volatility - but also the need to maintain profitability and growth in a world defined by rapidly-evolving disruptive technologies. Today, the value proposition of...
Starting with the 2007-9 financial crisis, which exposed the fallacy in the idea that any market participant is "too big to fail", banks and their traders have recognized a need to get smarter about counterparty credit risk. As a result, concepts such as credit valuation adjustment (CVA) have evolved from a useful...
We've witnessed companies across industries suffer serious reputational and financial damage due to legal and regulatory compliance failures. Most had what they considered reasonable compliance processes, but somehow they didn't work. More and more corporate resources are spent on compliance, with greater attention in...
Uncertain times and a volatile economic climate have contributed to an expanding focus on corporate governance, risk, and compliance (GRC) across all industries. While some companies have met their risk and compliance challenges head on with insightful business strategies and powerful technology solutions, many are...
The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of...
Exploiting vulnerabilities in applications, browsers, and operating systems is often the first step in compromising a target. But despite increased investment, security and risk professionals continue to struggle with remediation. A new analyst report takes a look at the current state of vulnerability risk...
Despite advances by the security industry, criminals continue to break through security defenses. And attackers now realize that bigger and bolder attacks are not always better. New threat intelligence and trend analyses reveal how attackers take advantage of the gaps between the defenders' intent and action.
The...
It is not too far when most enterprises will experience doomsday scenarios, as cyber threats are only increasing faster than the ability to implement security improvements. One cannot deny the fact that even those organizations employing good cyber practices are being penetrated, as hackers are getting more...
More and more companies today are finding themselves under a multitude of common and advanced malware attacks. As a security professional or IT manager, you are likely struggling to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.
With the Cisco® Advanced...
Today's constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the...
Organizations constantly faces security issues as the workforce, technologies, and regulations change. And, as network perimeters dissolve, security considerations and concerns change. With more devices accessing your network, is your corporate mobile device security policy adequate and effective?
The Cisco®...
Cisco AMP Threat Grid combines static and dynamic malware analysis with threat intelligence into a single, unified solution. It integrates real-time behavioral analysis and up-to-the-minute threat intelligence feeds with existing security technologies, protecting you from both known and unknown attacks.
Download...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.