Extortionists and "free agent" rogue insiders have emerged as the top two most malicious cybercrime threats to banking institutions, says Gartner's Avivah Litan. How should institutions bolster their defenses?
The Cisco 2015 Midyear Security Report examines intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores:
Future trends
Offers
Advice for...
The Before, During, and After an Attack Whitepaper explores recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. This paper will also investigate the challenges that created the...
Take a threat-centric approach to security. Don't settle for costly security point solutions or less secure Unified Threat Management (UTM) products. Keep your midsize organization secure from threats before, during, and after an attack- today and into the future.
If your midsize organization needs advanced...
Security attacks place your customer data, corporate assets, and intellectual property at risk. Small and midsize businesses have become high-level targets for cybercriminals and require next-generation firewalls (NGFW) tailored just for them.
Next-Generation Firewalls for SMBs Whitepaper outlines the...
In the wake of the discovery of the serious Android Stagefright flaws, which affect an estimated 950 million devices, security researchers reveal that they discovered yet another Stagefright flaw - and that Google's initial fix could be exploited.
Using the latest in modeling and identifying patterns, TD Bank is leading the way in finding solutions that can help to detect fraud; respond to fraud; investigate fraud intelligence and to use behavioral analytics for advanced, predictive, actionable information. By using a 360 degree view of the customer, TD Bank...
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
Forrester Research recommends that "organizations should consider shifting from traditional on-premise web gateways to a SaaS web content model." In the most recent Forrester Wave for Saas Web Content Security, analysts predict that "within the next 3 years, on-premises web gateway deployments will become the...
The Internal Revenue Service says cyber thieves may have accessed as many as 334,000 taxpayer accounts in a breach of its Get Transcript system, far more than the 114,000 accounts it originally estimated in May.
What do successful but separate malware attacks against banking customers around the world, as well as the White House and health insurer Anthem, all have in common? Researchers say the answer is shockingly simple.
Attack techniques come and go as technology and user behaviors change and defenses adapt to new threats - and sometimes take their eye off old ones - and the return of malicious macros offers an opportunity to examine and understand the drivers behind these adaptations, an exercise that is equal parts business case...
As advanced threats increase in frequency and sophistication, it's never been more important to secure your organization's email, by far the number one threat vector. Named a Leader in the Gartner Magic Quadrant for Secure Email Gateways, Proofpoint uniquely combines a world class email gateway solution with the...
Security is a busy sector: Symantec jettisoned Veritas, Zscaler became a "unicorn" after its most recent funding round, and we have other M&A news from Cisco, Fidelity National Information Services and Proofpoint.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.