Data security law continues to evolve. Enactment of the General Data Protection Regulation (GDPR), which takes effect May 25, 2018, will impose formal, new data security requirements on organizations with business operations in the European Union or handling data of EU citizens. Adoption of the new GDPR is motivating...
All fraud hurts, but when compared to other instruments and transaction channels, nothing has the potential to hurt like check deposit fraud. Account take over is still a major problem in the banking industry, and with recent mass compromise events, the risk is on an upswing.
Download this infographic to...
With so many firewall options on the market today and new malware attacks launching weekly, choosing a weak firewall solution will render you as a wide open target. So, how do you avoid posting an open season sign for hackers?
In this white paper, you will learn the 10 necessary functions of a next-gen firewall to...
The Department of Homeland security sees malware provenance - which identifies the attributes of malicious codes - as a way to complement its signature-based Einstein intrusion detection and prevention systems to find malware that infects IT systems.
Virtualization promises to boost efficiency and cut costs, making it an important element in your IT department's efforts to do more with less. Whether you're running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other...
Ireland's Cyber Crime Conference in Dublin drew a capacity crowd for a full day of security briefings, networking, hotly contested capture-the-flag and secure-coding challenges, as well as a chance to sharpen one's lock-picking skills.
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
Intel Security cybercrime expert Raj Samani says that after the April disruption of the Beebone botnet by law enforcement agencies, researchers have found more infected nodes than normal, largely in Iran.
Cybercrime continues to evolve, offering an ever-increasing array of niche capabilities, ranging from attack techniques and infrastructure to related research and sales services, warns Trend Micro's Bharat Mistry.
New, advanced point-of-sale malware dubbed "Poseidon" can exfiltrate card data directly from every infected device. And security experts warn that too many retailers fail to test POS devices and segment networks to mitigate all malware threats.
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
Emerging malware increasingly puts banks and their customers at risk for fraud. The sooner malware is detected and removed, the less likely banks are to suffer regulatory penalties and fines, and steep losses linked to fraud.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.