Advanced persistent threats are evolving, and banks can help thwart them by using continuous monitoring for real-time detection, says J. Paul Haynes of eSentire.
From sophisticated malware to socially-engineered schemes, banking institutions of all sizes are under constant, multi-channel attack. How can they respond? Daniel Ingevaldson of Easy Solutions shares ideas.
Compromise - a rare word heard between Capitol Hill and 1600 Pennsylvania Avenue - is being bantered about as the first major cybersecurity bill of the new Congress is introduced.
Ron Ross, the NIST computer scientist who heads the initiative that is revising the guidance, characterizes the updated publication as the most comprehensive one since the initial catalogue of controls was issued in 2005.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
In 2012, we saw the rise of state-sponsored malware, as well as the evolution of Trojans and ransomware. What new threats will 2013 bring? Adam Kujawa of Malwarebytes offers insights.
It will be a few years until many organizations reach a level of maturity with continuous monitoring. Getting there will take organizationwide acceptance, says George Schu of Booz Allen Hamilton.
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
As our digital ecosystems evolve, we must remain aware of new and emerging risks and stay committed to finding new methods of ensuring protection. Today's cyber attacks reflect an extensive array of techniques designed to compromise and infiltrate. In fact, these attacks have grown so complex and varied that...
It's as much about people as it is technology for organizations to successfully implement a continuous monitoring program, says George Schu, senior vice president at Booz Allen Hamilton.
Eurograbber is more than just another banking Trojan. It's an exploitation of fundamental online banking authentication practices that could strike any institution, says Check Point's Darrell Burkey.
In this week's breach roundup, read about the latest incidents, including a storage system vulnerability affecting 235,000 state university students and a stolen laptop at a home healthcare service.
Given the magnitude of sensitive information on Social Security Administration computers, the inspector general says, any loss of confidentiality, integrity or availability of systems or data could have a significant impact on the nation's economy.
Trying to embrace BYOD while ensuring your employees can access all of the business apps and content they NEED on the mobile devices they WANT - without compromising security, integrity or compliance? This whitepaper explores the impact of consumerization and BYOD on modern IT departments, and the evolving...
A recent Aberdeen Group Market Alert offers in-depth analysis about how attackers are targeting and successfully exploiting known vulnerabilities in the certificate infrastructure, and why most enterprises are not managing the associated risks.
Download the Market Report to learn:
Why certificates are the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.