So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
EMM platforms are evolving from tactical device management tools to broader unified end-user computing management platforms, crossing mobile devices, apps, and data, as well as traditional computing platforms such as laptops and PCs. As mobility grows in the enterprise, EMM solutions will become centralized control...
Are people predisposed to creating weak passwords due to their comfort level with simple, easy to remember names and dates?
Is the fear of forgetting a password a stronger motivator than the fear of being hacked?
Is it simply a case of user apathy that they either don't care or don't see themselves as being at...
The internet of things is being compromised by malware-wielding attackers exploiting default credentials baked into devices. What will it take for manufacturers to ship devices that are secure by default?
7-Eleven has long been an innovator in retail information systems. Their challenges were they needed secure and reliable network to make it easier for store managers to stock fresh foods and order merchandise to keep pace with ever changing customer preferences. They chose Juniper Networks to overcome these...
With Windows 10, Microsoft introduces a consolidated operating system (OS) platform that changes how organizations treat the management of End-User Computing (EUC) environments. This new way of managing Windows is more closely aligned to the enterprise mobile management (EMM) based approaches found in mobile...
Most financial institutions used to allow customers to log in to their accounts with a simple username and password. But passwords are notoriously insecure - many users choose weak passwords that can be easily guessed or cracked. In an effort to help strengthen security, large numbers of banks began using a second...
Financial malware - that is, malicious software designed to enable fraudulent transactions - is a growing concern for line-of-business executives, heads of retail and commercial banking, leaders of global compliance operations, and risk management officers worldwide. Fraudsters rely upon increasingly sophisticated...
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
Mobile banking continues to gain momentum, growing faster than any other banking delivery channel to date. Many financial institutions contemplate expanding capabilities in the mobile channel, but they are concerned about security.
Fortunately, new security measures are available to mitigate the risks associated...
In the beginning, there was darkness... and then in a white-hot burst of innovation came the first smartphone, and the world of work was changed forever. IT has been trying to keep up with the demands of mobile workers ever since and Mobile Device Management (MDM) was a pretty good solution. But, of course, innovation...
At the core of every cyber-security strategy is identity and access management. Because so many security issues and audit failures are user-related, organizations need to make sure people have appropriate, up-to-date access entitlements and that their access activities are monitored wherever they are located. The...
Despite advances by the security industry, criminals continue to break through security defenses. And attackers now realize that bigger and bolder attacks are not always better. New threat intelligence and trend analyses reveal how attackers take advantage of the gaps between the defenders' intent and action.
The...
It is not too far when most enterprises will experience doomsday scenarios, as cyber threats are only increasing faster than the ability to implement security improvements. One cannot deny the fact that even those organizations employing good cyber practices are being penetrated, as hackers are getting more...
More and more companies today are finding themselves under a multitude of common and advanced malware attacks. As a security professional or IT manager, you are likely struggling to effectively identify attacks, let alone prioritize the most dangerous ones that should be addressed first.
With the Cisco® Advanced...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.