Security leaders face more threats than they'd like, but with fewer security personnel than they need. Aaron Miller of Palo Alto Networks discusses the case for new automated security solutions.
Some larger organizations are implementing software-defined wide area networks to help with enterprisewide network security over multiple locations and branches, says Ramanan C of Citrix.
Many organisations understand that in today's enterprise technology landscape, the traditional network perimeter approach to defending against cyber threats is not enough to ensure a cyber resilient environment. This has given rise to the concept of identity being a key focal point in any cybersecurity strategy. Ian...
This session focused on the criticality of network monitoring and security and why should you think about inline security when upgrading your firewall, and how you can ensure zero failure of your IPS and IDS devices.
In the wake of WannaCry, there's a critical new flaw in Samba, which provides Windows-based file and print services for Unix and Linux systems. Security experts say the flaw is trivial to exploit. US-CERT recommends immediate patching or workarounds.
Target has reached a record settlement agreement with 47 states' attorneys general over its 2013 data breach. The breach resulted in hackers compromising 41 million customers' payment card details and contact details for more than 60 million customers being exposed.
So far this year, we've seen heightened tensions between the U.S. and adversaries in Russia, North Korea and Iran. How do these tensions manifest on the cyber stage? Tom Kellermann of Strategic Cyber Ventures talks about the cyberwar risks brewing below the surface.
Remember Microsoft's Wi-Fi Sense? A security researcher has discovered how the beleaguered feature in Windows 10 could force an unsuspecting user to automatically connect to a rogue access point.
As data continues to grow and become increasingly regulated, organizations will need an enterprise-wide security strategy that's holistic, covering users as well as data, while also improving their compliance posture. It's easy to think of the mainframe as just another platform in the data center, until you stop and...
Another day, another data breach in the news. Ransomware at a hospital, the latest IRS breach, a phishing scam at Snapchat . . . you tune out the details. For every breach that makes headlines, dozens of other organizations have had data stolen or corrupted by hackers...or even their own users. Cyberthreats become...
Businesses around the world are seeing an increase in malware attacks, including ransomware like CryptoLocker, Locky, and zCrypt. These attacks can result in weeks of downtime, and some of the most damaging data breaches originated with malware, including the Target breach in 2014.
A robust malware defense could...
Hybrid cloud security is a hot topic, especially with the massive growth of public cloud providers like Amazon Web Services (AWS), Microsoft® Azure�� and Google Cloud. With the emergence of the hybrid cloud, where workloads are deployed across physical, virtual, and cloud, security professionals are constantly being...
Why do we continue to see so many cyber breaches? If we look at why most cyber breaches of the past year occurred, we see that it comes down to three major factors - the human factor, identities and credentials, and vulnerabilities. Living in a digital social society, we share more information, ultimately exposing...
To meet the increasing customer demands for effective solutions, security vendors must ensure their products work together well, says Dr. Mike Lloyd of RedSeal. This is particularly essential to achieving "digital resilience," the ability to promptly detect and respond to network intrusions, he says.
Bots come in all varieties - both good and bad. Bad bots especially, evolve if you block them. A better strategy is therefore to manage bots.
In this e-book, you'll learn how a single strategy to manage all kinds of bots - that is to say, blocking - simply cannot cover all of the different types of bots that are...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.