Ponemon Institute has completed its fifth year studying the cost of cyber crime to businesses around the world. The 2014 Cost of Cyber Crime Study taps the collective experience of 257 organizations in seven countries. It shows that cyber crime and its associated cost to businesses continues to rise. But there is good...
The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security. Analyst Robin Layland applies those lessons to establish key requirements for next-generation firewalls (NGFW). Then HP's TJ Alldridge explains how HP...
Today's workforce is highly mobile. They don't just work on laptops, they also use smartphones, tablets and other devices, many of which they brought into the enterprise themselves. In addition, these workers don't stay put. While many work from the office, most access corporate networks and data from a variety of...
Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But while endpoint defenses are necessary, the headlines show they are not sufficient. Rather than relying on endpoint security alone, Gartner recommends businesses balance their investment across all four phases of...
Critical infrastructure industries vary in the sophistication of their digital defenses. But malware including Stuxnet and Flame, denial-of-service attacks on the financial industry, and other threats have made it clear that all sectors are targets.
This eBook looks at key dependencies among critical...
Security breaches in large enterprises make the headlines, but 55% of small and mid-size businesses have also experienced a data breach. This e-book examines the security challenges unique to mid-size companies and the steps you should take to protect your business.
Download this eBook to learn:
Why...
In the fight against cyber bad guys, having smart, skilled good guys is critical. But even as businesses increase their reliance on security analysts, they face a serious workforce shortage as they attempt to find and hire the talent needed. The solution: grow your own.
This business white paper coaches IT leaders on...
Your ability to spot and stop cyber attacks depends on having the right security people, processes, and technology in place. HP Security Intelligence and Operations Consulting has assessed the security programs of dozens of enterprises. The results are concerning-24 percent of companies do not meet minimum...
How do fraudsters go about stealing identities, and how can you stop them? ID verification company Jumio spoke to convicted ex-fraudsters, professional criminologists, law enforcement practitioners and fraud managers to uncover some of the most commonly used exploits. This white paper presents what they heard...
This "State of Infections" report discusses the state of the enterprise under attack and trends in threats seen in the second quarter of 2014.
Key findings in this report include:
The rise of ransomware;
The relationship between the size of an enterprise and its infection rate.
ISMG, in cooperation with the International Cyber Security Protection Alliance (www.icspa.org), is carrying out research to determine the primary types of financial fraud targeted at UK businesses and citizens and where the biggest security gaps are.
The ICSPA is in turn working with the City of London Police and...
Mobile banking technology may be one of the best retention tools available to banks - a differentiator. Mobile banking customers are 53 percent less likely to leave; and if customers use both mobile banking and bill pay the retention rate increases to 82 percent. The challenge banks face is increasing the security of...
This buyer's guide will aid organizations in specifying information security solutions for rapid detection and resolution. The need for these solutions has never been greater as organizations struggle to fight a deluge of sophisticated cyber threats and breaches. Many go undetected until it's too late to do much more...
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
In our increasingly mobile society, organizations, their employees, partners and customers are at greater than ever risk of identity theft and fraud. How prepared are organizations to mitigate these risks? It's not enough to have a breach response strategy. Do you have the right players and pieces in place to execute...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.