What can be done to mitigate the new spear-phishing campaigns that are localized, direct and capable of slipping past most spam filters? Two security experts offer timely insights.
RSA's Art Coviello finds today's cybersecurity strategies to be lacking. Global organizations must rely more on big data and public-private partnerships to defend themselves from advanced threats.
Privacy attorney Ron Raether challenges a commission's recent recommendation that the government should support companies that use the hack-back approach to mitigating the theft of intellectual property.
In this week's breach roundup, read about the latest incidents, including a hacker pleading guilty for his role in the 2011 breach of Strategic Forecasting Inc., a global intelligence firm, that affected about 860,000 individuals.
A variation of hack-back - in which a victim of a cyber-attack assaults the assailant's computer or network - could be used to mitigate the theft of intellectual property, according to the Commission on the Theft of American Intellectual Property.
Facing advanced cyber-attacks, organizations must shift their focus to detection and mitigation, says ISACA's Jeff Spivey, who outlines four capabilities necessary for effective response.
A distributed-denial-of-service attack in Europe highlights the need for Internet service providers to implement security best practices to prevent future incidents and protect their users, ENISA's Thomas Haeberlen says.
Maintaining accurate logs of systems' activities is crucial in helping catch insiders who threaten an organization's digital assets, says George Silowash, co-author of the Common Sense Guide to Mitigating Insider Threats.
Breach statistics for 2012 show DDoS attacks dramatically increased in all sectors, says Verizon's Dave Ostertag. "If your organization, company or agency has a presence on the Internet, you're a potential victim now."
In this exclusive interview, Tim Horton of First Data explains how the nation's largest credit card processor is helping financial institutions and merchants mitigate risks posed by malware and DDoS attacks.
Providers of technologies employees acquire through unconventional channels that could bypass their employers' supply-chain controls are known as "shadow suppliers." Here's why you should care about them.
In the aftermath of an international $45 million cyberheist and ATM cash-out scheme, experts say pinpointing the source of such a massive breach can be difficult. Why?
How Organizations Can Respond Faster to Today's New Breed of Cyber-Attacks
Under the shadow of advanced security threats, only 20% of organizations rate their incident response programs as "very effective." Their biggest gaps: Being able to detect and contain malware, which can also be the precursor to advanced...
Payment data and personal information are both attractive targets for criminals, says breach investigator Erin Nealy Cox of forensics firm Stroz Friedberg. Learn why she says card data isn't the only lucrative target.
The massive distributed-denial-of-service attack in Europe that targeted Spamhaus could easily have been prevented if information service providers followed a 13-year-old industry best practice, ENISA's Thomas Haeberlen says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.