Russian and European malware and spam purveyors have been hijacking Internet routes. Pending a massive infrastructure upgrade, security experts warn that such attacks can be detected, but not easily blocked.
Eighty-six percent of Indian security practitioners agree there's an acute shortage of skilled cybersecurity professionals. What should be done to fill the gap? And what are the risks if we don't?
In addition to dealing with sophisticated threats to SCADA and IC Systems, utilities have to address specific regulatory requirements like NERC Critical Infrastructure Protection (CIP) Cybersecurity Standards.
Download this whitepaper to:
read a summary of the NERC CIP requirements;
identify the key security...
When shopping in-store, customers want and expect connectivity - plus they are inclined to buy more when they have a personalized shopping experience. However the cyber security responsibility falls directly on the retailer to protect their customers and the company's reputation from the next data breach.
Download...
As a 20+ year leader in check fraud detection and prevention, Fiserv has the unique opportunity to observe market trends related to RDC and check fraud. During this webinar you will hear from Mike Urban with Fiserv Financial Crime Risk Management, who will discuss these trends and the specific capabilities banks need...
For the third time in recent weeks, in-the-wild attacks are exploiting a newly discovered zero-day vulnerability in
Adobe's Flash plug-in for Web browsers, Trend Micro reports.
Hackers posing as women on Skype tricked Syrian opposition fighters into infecting their systems with malware, which furnished the hackers with "valuable insight into military operations," according to a new report from cybersecurity firm FireEye.
The end of a year brings reflection as well as a chance to pause and look to the future. To help businesses understand implications of such changes and navigate the road ahead, Experian® Data Breach Resolution has developed six key predictions about how the data breach industry will evolve in 2015. These predictions...
As cyber attacks via third parties become more commonplace, IT decision makers have focused much of their energy on the cyber security of their vendors. It can be a challenge to manage so many different partnerships. Due to the desire for more data-driven decisions, those IT professionals are looking for an automated...
Threat intelligence is one of the biggest buzzwords in the information security space. While organizations know that they need threat intelligence, many remain unsure of what the term really means. Is it a feed? Is it a collection of random security intelligence? What should organizations expect from threat...
Online and mobile commerce is increasing exponentially - unfortunately so is fraud based on stolen or fake identities. Combating identity-based fraud is challenging, but the key to success is a multi-phase approach - one that encompasses identity verification and big data for fraud mitigation.
Join this session...
Even a few weeks after the RBI announced its plan to consider removal of the two-factor authentication requirement for small-value transactions, security critics continue to react strongly against the notion.
Starting in April, Singapore plans to have a dedicated and centralized cybersecurity agency. But experts question whether the agency can take a holistic approach and effectively coordinate with industry.
Chinese authorities reportedly want foreign software and hardware vendors that sell to its banking sector to share source code and encryption keys. Western technology firms have reacted with alarm.
IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.