When you are hacked, every second matters. It's critical to detect and stop the attack before serious damage is done to your business. HP TippingPoint Next-Generation Intrusion Prevention System (NGIPS) examines every packet of network traffic at wire speeds to detect and block attacks.
This (slightly...
The security industry has thousands of researchers looking for vulnerabilities in the software you use - HP Security Research alone has more than 3000. But how do you apply the security intelligence they develop to the job of protecting your network?
The Activate "Network Security Intelligence Selection Buying...
Federal regulators have hit a small Denver pharmacy with a $125,000 penalty for a 2012 breach involving improper disposal of paper patient records. It's the second such HIPAA-related penalty within a year tied to improper records dumping.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
SIEM systems were orginally intended for compliance and log management. Later they were used to detect and investigate attacks. However, log-centric SIEMs have several flaws that make it difficult to detect successful attacks and even more difficult to investigate them. Log-centric SIEMs give security personnel some...
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
This e-book contains insights on breach readiness, response and resiliency based on in-depth interviews conducted with the Security for Business Innovation Council. Readiness benchmarks for the industry at-large are drawn from a global survey of 170 security practitioners in 30 countries. Measures within four major...
If you are reading this paper your most pressing concern undoubtedly is protecting your organization's intellectual property and sensitive customer data. Highly visible breaches and attacks have brought an intense focus on organizations' incident detection, investigation and mitigation capabilities. After all, if you...
Miercom, a leading security testing firm, recently performed a head to head security efficacy analysis of network-based breach detection and Advanced Persistent Threat (APT) prevention solutions that utilize sandboxing. Zscaler Internet Security and FireEye Web MPS 1310 were tested, and Miercom found the Zscaler...
A group of financial institutions affected by the 2013 Target data breach is asking a court to stop the settlement between the retailer and MasterCard that would provide $19 million to card issuers, saying the amount is grossly inadequate.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
Customers are embracing new technologies and their expectations are changing rapidly in today's connected world. They want to interact through a variety of applications, at any time and from any device. Banks, retailers and many other consumer facing organizations are racing to enable new interaction channels to...
The rapid proliferation of mobile devices has created additional security requirements for any organization attempting to increase its presence in the online market. And because smartphones and tablets afford end users a variety of new ways to interact with the enterprise, IT needs to evolve the security measures...
With customer loyalty at stake and competitive pressures on the rise, more and more businesses are increasing their mobile apps budgets and development efforts. By doing so, they hope to not only improve their ability to engage with customers, but also reap the benefit of a lower-cost business model. The...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.