How should the United States respond as global competitors expand their influence over the Internet and build cyber capabilities? An analysis of the Internet in 2020 shows that the United States must develop a strategy that focuses on more than technology to retain its cyberpower status. Read this white paper and...
Cloud computing has drawn a great deal of attention as a way to reduce IT costs in healthcare. But are the companies that offer cloud computing well-prepared to meet the HIPAA privacy and security requirements?
Join us for this exclusive session, where you'll gain an in-depth understanding of issues relevant to...
Malware is likely to blame for the so-called "computer glitch" that over the weekend took down a handful of the country's largest banks' ATMs and online banking sites.
A recent rash of targeted phishing schemes -- which included hits to military accountholders and their families at USAA and Navy Federal Credit Union, as well as a separate attack on officials at the World Bank -- has again brought the crime to the fore.
This four-chapter eBook, written by security expert Dan Sullivan, describes the catastrophic effects that can occur from insider abuse and reveals effective techniques for countering them.
The eBook examines:
The range of insider threats - and the havoc they can wreak;
Why conventional security controls...
With one IT department in five spending more than half its time and resources on routine updates, maintenance and administration of existing systems, it is not surprising that top business objectives such as business process improvements, reducing enterprise costs, increasing the use of information/analytics,...
Explosive growth in the mobile workforce has led to increasing attention paid to the security of mobile data and devices. Mobile data security is most effective when implemented in a series of layers: installing smart firewalls, deploying anti-virus software, and using encrypted connections. True mobile security...
There is no doubt that the threat facing organizations today is enormous. At the same time, many organizations believe that improving security technology is the answer to solving the complex security challenges of today. Security technology has evolved from static firewalls and anti-virus products to full suites of...
Access to email and the Internet is a business critical application for most organizations, but the attributes that make such resources so essential inevitably generate significant risks for employers. Incidents of email and Internet misuse continue unabated.
This paper considers some of the main risks that arise...
According to a 2009 survey by New York-based research firm Access Markets International (AMI) Partners, small and mid-sized businesses (SMBs) are becoming increasingly mobile organizations. This paper will discuss the growing concerns these organizations face with an increasingly distributed and mobile workforce,...
This three-part report describes how all businesses can benefit from SaaS services, in particular the variety of services that make up hosted services from Symantec. It also provides advice, best practices, and insight on how to create security and management policies for a distributed workforce.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.