With the growth in the number and sophistication of cyber threats and daily reports of security breaches, cyber risk is high on the list of the most significant risks that organizations face. Faced with a constant
stream of evolving threats, many businesses spend millions of dollars annually on people, processes, and...
Two security firms have investigated what they describe as a malware platform for attacking the industrial control systems that run electricity plants. They warn that the platform was the likely culprit behind the December blackouts in Ukraine.
A report on security flaws found in mainframe computers leads the latest edition of the ISMG Security Report. Also, the tale of how a hacker launched his career; insights on new EU data protection regulations.
Group-IB, one of the global leaders in providing high fidelity Threat Intelligence, leaves no doubt that the Lazarus group, which attempted to steal 1 billion USD from the Central Bank of Bangladesh and attacked Sony Pictures, is connected to North Korea.
Group-IB Threat Intelligence experts identified new...
A lot of the risk to an organization's reputation is caught up in how an organization is able to respond to a cyber attack. Over the years, organizations have suffered serious consequences from a cyber attack. They've lost a lot of data, and the public response to those incidents has really further damaged the...
A recent study rates the cybersecurity performance of Fortune 1000 enterprises. Despite the rash of high-profile breaches and the reality that organizations are dedicating significant resources to cybersecurity, there really isn't a decrease in the number of reported incidents.
Download this whitepaper to...
With so much of a typical IT infrastructure operating in a virtualized manner these days, IT organizations can experience a variety of challenges when protecting, recovering, and ensuring the availability of mission-critical platforms. Whenever IT modernizes any aspect of a specific production platform, it must also...
Which strong authentication and transaction risk analysis solutions can comply with the requirements of strong customer authentication (SCA) in the final draft regulatory technical standards (RTS)?
Download this whitepaper to learn:
Classification of common strong authentication solutions
Requirements for strong...
Social engineering is not a new concept, but it is an enduring one that is steadily growing, with no end in sight.
One of the most common social engineering schemes is phishing, which is defined as "the use of social engineering and technical subterfuge to defraud an online account holder of their financial...
More than 60% of smartphone and tablet users reported that Mobile Banking capabilities are important in their decision to switch banks. Hacks happen, and the vulnerability of so much information creates a very real challenge for banks and users alike.
Download this whitepaper to learn how to:
Design Secure Mobile...
As more banking customers make use of mobile devices and apps, the opportunities for fraud increases. Mobile apps broaden the attack surface to devices that often have limited security measures. Besides security, mobile apps also have the challenge to be as usable as possible.
Download this whitepaper to learn how...
Deception is the most successful strategy in military history. Just as armies used deceit to conquer continents, cyber-deception is being used by more and more organizations to exploit a hacker's greatest weakness - being a human, after all, behind a keyboard. Deception techniques such as honeypots are not a new. But...
To encourage individuals to improve their security practices, begin by not blaming them. That was one takeaway from security experts at the Infosecurity Europe conference, who offered practical tips for changing user behavior and creating a culture of security.
Former FBI Director James Comey trickled out new details during a Senate Intelligence Committee hearing about what the FBI knew and when regarding Russia's alleged cyber intrusions. We've rounded up the details.
A discussion that explores the predicament many information security managers face when deciding which security technologies to buy in a glutted market leads the latest edition of the ISMG Security Report. Also: An update on cyber flaws in connected vehicles and the latest from Infosecurity Europe.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.