As they develop mitigation strategies, organizations must keep in mind that all cyber-attacks, ranging from DDoS to phishing, ultimately aim to compromise data - and they virtually all are advanced and persistent.
Collaboration among public and private entities is a tough sell in any marketplace. But in Asia, the challenges are unique. Here are examples of how Asian entities are fostering information sharing.
What can U.S. and European organizations learn from Asia-Pac about advanced mobile tech and increasing cyberthreats? That's a question I hope to answer while in Singapore for RSA Conference Asia Pacific 2013.
The FDIC, in a notice to consumers, highlights questions that customers should be asking banks about DDoS attacks. But is the notice an indicator that more regulatory oversight is ahead?
One banking association is lobbying to have merchants held more accountable for attacks against their networks and systems that breach card data. But will their efforts convince Congress?
On the record, security experts talk about the improvements banking institutions have made in DDoS defense, and there's no doubt they have made major improvements. Off the record, they are less optimistic.
Banks have improved DDoS defenses, but ensuring ongoing online reliability requires a more offensive measure - one that rids the Internet of vulnerable sites that can too easily be used for bot traffic.
In this newest banking fraud scheme, fraudsters use the customer service chat feature within the online banking platform to schedule fraudulent wires. How can institutions detect and prevent this scam?
Information sharing is key. The more we share about attacks - vulnerabilities and vectors - the more we will learn about how the attacks are waged, who's behind them and what they're after.
It's been nearly a month since the latest DDoS attack against a U.S. banking institution. What do the hacktivists say? Are the attacks over, or can we expect to see a new round of assaults?
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
By understanding the motivations behind hacktivism, organizations can learn why good public relations can play an important role in thwarting attacks or minimizing their impact.
Symantec says Internet vulnerabilities are down, but don't get too comfortable. We can expect more attacks in 2012. Why are the same threats still posing so much concern?
Up to now, business and government have not paid much attention to hacktivists. But that's got to change. In fact, cybersecurity threats waged by hacktivists pose increasing concern.
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many institutions fail when it comes to addressing this most obvious security risk?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.