Lastminute.com is a worldwide travel company that helps customers in 40 countries search and book travel related products and services. The company operates a portfolio of well-known brands, each with a consumer website in multiple languages and its own security and performance needs. Their total combined traffic...
Great Rail Journeys is the UK's leading seller of holidays by rail, making it easy for customers to browse and book trips online. But as they were actively expanding their customer base internationally to North America, with the ultimate goal of delivering services globally, they recognized a few technical challenges,...
As breaches become more commonplace in India, law enforcement agencies are leveraging new technologies to assist in investigations. This edition of CyberEd APAC features an interview with Brijesh Singh, inspector general of police for cyber in Maharashtra, who outlines the challenges in investigating breaches and the...
Selecting the right access solution to meet your needs is a two way street - you need to know what your organization expects from a solution, and the solution you pick must measure up. Finding the solution that meets your needs is a critical step in building a comprehensive security system.
Download this guide to...
Even with strong passwords, attacks are more sophisticated - and persistent. Pairing passwords with additional technology and authentication factors is essential to keeping the business secure. But what type of authentication is right for your business?
Download this guide to learn:
The fundamentals of MFA
When you...
The revolving regulatory standards that IT teams have to adhere to are cumbersome. They're even more difficult to navigate while having to meet executive mandates to enable faster and faster business growth. Balancing these competing priorities can cause significant headaches.
Download this white paper to learn more...
Financial firms are on the front lines of security evolution. Enhanced online payment and banking features are rapidly adopted after roll-outs, but fraudsters and money launderers only see this as an opportunity - so what are the next steps when fraud checks and sanctions screening are already happening in real...
The growing demand for innovation has accelerated implementations of automated software development pipelines whilst driving open source consumption to new heights.
For the fifth anniversary of this report, Sonatype collaborated with Gene Kim from IT Revolution, and Dr. Stephen Magill from Galois and MuseDev. ...
In the past year, cybercriminals behind
two of the biggest ransomware attacks
have abandoned other techniques
in favor of exploiting remote desktop
protocol. Matt Boddy of Sophos explains
why RDP attacks are so popular - and
what you can do to discourage them.
Download this eBook to learn more about:
Findings...
With new threats targeting the nation's critical infrastructure, partnerships among government and private-sector security professionals are more critical than ever, says Brian Harrell of the U.S. Cybersecurity and
Infrastructure Security Agency. Harrell was a featured speaker at ISMG's recent Cybersecurity Summit in...
Aligning your enterprise's password policy with the latest guidelines from the National Institute of Standards and Technology (NIST) can help encourage better password habits and reduce the risk of account takeover. You can enforce many of these guidelines through the built-in settings provided by most directory...
The Buyer's Guide for Complete Privileged Access Management (PAM) is the most thorough tool for holistically assessing your privileged access security needs and mapping them to modern privilege management solutions. This detailed PAM Buyer's Guide will help you identify where to begin your privileged access management...
Ransomware attacks are becoming more targeted, tailored and stealthy. But they are still capable of wreaking havoc on organizations' networks, encrypting files and extorting payment for retrieval. Modern firewalls are purpose-built to defend against these kinds of attacks, but they need to be given an opportunity to...
Account takeover continues to be a
lucrative path for fraudsters across all
industry sectors. But Scott Olson of
iovation says there are different levels of
defense that can be deployed, based on
the risk of specific types of transactions.
Download this eBook to learn more about:
The different manifestations...
The sheer number and destructive nature of recent data breaches is both alarming and discouraging - but there's still cause to be hopeful. Nearly three-quarters of these attacks were due to the same vulnerability: weak or stolen credentials.
Download this white paper to learn:
What are strong authentication...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.