Understanding the common mobility use cases and security requirements is paramount when planning an organization's mobility strategy. And, with security breaches are at an all-time high, Gartner has released its inaugural Critical Capabilities for High Security Mobility Management report1*, providing IT leaders with...
In this insightful session, you will learn about two aspects of the Mobile Banking Revolution:
Part I - Don't Just Stop Fraud; Improve Customer Experiences: Consumers demand online and mobile banking -- but the financial institutions are justifiably cautious about putting their customers at risk of fraud. Banks and...
Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.
Human resources departments can play an important role in helping to prevent insider breaches, says Reid Stephan, IT security director at St. Luke's Health System. In an interview, he describes his organization's strategy.
The takedown of Gameover Zeus taught law enforcement and banks many lessons, including that Trojans are being used to steal corporate secrets, not just money, says Eward Driehuis of Fox-IT, which investigated the threat actors behind the Trojan.
The Black Hat conference features presentations that have already led to very public warnings about remotely hackable flaws in everything from Jeep Cherokees and Linux-powered rifles to Android mobile devices and Mac OS X.
The recent seven-day malvertising campaign that ran via Yahoo's ad network demonstrates not just the challenge of finding these attacks, but the difficulty of blocking or eradicating them.
Georgia Tech researchers are attempting to develop new processes and technologies to more easily detect malware. The goal, researcher Wenke Lee explains, is to find an effective way to identify and expunge advanced persistent threats
The 30-day Cybersecurity Sprint overseen by Federal CIO Tony Scott has crossed the finish line, but in reality, it looks more like a starting gate to a marathon to get the federal government to secure its battered IT.
With every new layer of cyber security you put in place, the attackers respond by evolving their own tools and techniques. To combat this constantly changing threat you, too, need a new approach: FireEye as a Service.
This is not a usual Managed Security Service and it's not your typical Managed Security Services...
The old ways of implementing security and compliance mandates are no longer acceptable and the risk of high profile breaches has never been greater. With increased pressure on budgets, fewer resources and increasingly frequent audits, you need to find new ways to close security loopholes and reduce the window of...
Join Brad Zehring from Centrify as he explores use cases for the modern enterprise and demonstrates how privileged identity management as a service delivers:
Secure access for remote employees
Controlled access for outsourced IT (without managing more identities)
Centralized management of privileged identities...
The toolbar distributed by Chinese-language search engine Baidu is being targeted by opportunistic attackers and used to exfiltrate corporate secrets, warns Rob Eggebrecht, president and CEO of the security firm InteliSecure.
Attributing the Anthem, OPM and other breaches to specific attackers might be useful for government-level diplomatic efforts. But organizations must prioritize blocking all types of espionage and cybercrime attacks, says Symantec's Vikram Thakur.
Organizations are jumping on the threat intelligence bandwagon, but are they making strategic investments? Often not, says BrightPoint Security's Rich Reybok, who says "context" is often the key missing element.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.