Cybercriminals rely upon increasingly sophisticated techniques to steal the credentials of online banking customers, and then reuse them to take over the victim's account and perform fraudulent transactions such as transferring money to new destinations. IBM Security Trusteer solutions offer multiple layers of...
In a world where a week rarely goes by without reports of at least one serious cyber attack against a major organization, it's important to ask; What's happening across the threat landscape? What kinds of attacks are being launched? How many of those attacks result in incidents requiring investigation?
Download...
Around the world, employees increasingly use their own mobile devices in the workplace, often accessing corporate applications after-hours and off-site. In fact, a recent survey found that 86 percent of organizations either allow or plan to allow the use of employee-owned devices for work functions. Within these...
Many of the same characteristics that make cloud computing attractive can also make it challenging to secure. When a cloud is up and running today and gone tomorrow, or when the number of users quickly changes from 50 people in one city to 50,000 across the globe - how do you keep it secure?
Download this white...
The advent of cloud computing is beginning to transform the way companies engage with customers, partners, and suppliers to increase flexibility and streamline operations. Cloud computing makes it much easier for the organization to implement new business services and to create new revenue opportunities much faster....
As government agencies continue to face increasingly hazardous IT security threats, they are constantly challenged to keep these threats at bay while protecting sensitive - and often classified - data. To help them address these challenges, the US Department of Homeland Security (DHS) has been developing a process for...
When you have a smartphone or mobile device, the world is at your fingertips. Every day, there are new possibilities for mobile entertainment, shopping, banking, connecting socially and getting work done. But the speed at which mobile technology is changing has created dangerous gaps in security, and cybercriminals...
In an application-driven economy, security is not just about deploying controls for protection. It's about being a business enabler, says Steve Firestone, general manager of the security business at CA Technologies.
All too often, an enterprise invests in security technology and services thinking that they'll be protected from a cyber attack only to discover that they are breached anyway. It prompts some sober reflection and a reassessment of their whole approach to security.
Businesses undertake a security program assessment...
All Windows operating systems are at risk from the SSL/TLS vulnerability known as Freak, Microsoft warns. The company has outlined temporary workarounds - except for Windows Server 2003. Experts say no in-the-wild attacks have yet been seen.
British police over the course of this week launched 25 cybercrime-targeting raids and made 57 arrests, including suspects who have been tied to a U.S. Defense Department network intrusion, Lizard Squad attacks, as well as a massive Yahoo breach.
Attacks are larger, adversaries more diverse, and damage is broader. These are characteristics of today's DDoS attacks, and organizations need a new approach to protection, says Verisign's Ramakant Pandrangi.
Today's cyber world is an evolving landscape of known vulnerabilities and exploits coupled with new threats brought by new technologies. Security professionals must learn to protect their businesses from both.
The HP Cyber Risk Report 2015 brings the information you need to do that. This comprehensive study...
The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers exploit them to penetrate defenses and steal data.
The HP Cyber Risk Report 2015 provides a broad overview of the threat...
Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.in, you agree to our use of cookies.