As the cybersecurity threat landscape evolved over the past two decades, firewalls grew increasingly ineffective at blocking attackers from accessing network data. Next-generation firewalls (NGFWs) aim to fill those gaps, but do they really provide an all-encompassing solution for network security?
Download this...
The conversation around the cloud is not something new to the industry, with the topic showing up everywhere from IT back offices to Fortune 500 C-Suites. Despite cloud's ubiquity, there is still a lot to understand, regardless of your expertise level; there is not just one single cloud - and, for that matter, not all...
On May 25, 2018, all organizations that do business with citizens from the European Union will be subject to the enforcement of a new set of laws that help protect their sensitive personal identification information. Called the General Data Protection Regulation (GDPR), the legislation replaces a two-decade-old EU...
The front lines for conflict in the digital age now lay at the network gateway. Unfortunately, on today's virtual battlefield, the enemy is constantly advancing. While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world...
With business networks already supporting an array of mobile devices and remote workers - often on a global scale - many IT executives expect their bandwidth demands to only accelerate, surpassing 10 Gbps by 2020.
Download this report for key findings such as:
Despite the growth in cloud-based solutions, most...
As the manufacturing sector rides the ongoing waves of digital transformation, the strategic objectives of access and agility must be achieved while also addressing the relentless risks of security and compliance, as well as attaining the operational efficiencies needed to support an increasingly diverse portfolio of...
As you probably know, protecting applications with just a password is a recipe for breaches. What you might not know is that the situation is getting worse. The 2016 Verizon Data Breach Investigations Report (DBIR) stated that nearly two-thirds of data breaches involve weak, default, or stolen passwords; the 2017...
When operating in Amazon Web Services (AWS) it is important to understand your responsibility when it comes to security. AWS operates under a shared security responsibility model, where AWS is responsible for the security of the underlying cloud infrastructure and you, the AWS customer, are responsible for securing...
Businesses are engaged in an exciting era of technological advancement. As cloud technology continues to evolve, more and more apps are becoming available for businesses to utilize. These new tools have dramatically altered the way corporations create value, and are now common across all fields of business. What's...
The trends we expect to shape information security in 2018 will have implications well beyond the coming year. The continued advance of 'new IT,' cloud and increasingly 'invisible' infrastructure are already having an impact on the data center, with trends continuing to push organizations to increasingly weigh cloud...
According to the 2017 Identity Fraud Study released by Javelin Strategy & Research, in 2015, there were more than 1.5 million new account fraud victims that accounted for losses of $2.8 billion. This number increased by 40% in 2016, and there is no reason to believe that this trend is stopping anytime soon.
The...
As mobile devices eclipse computers and laptops as the preferred method of going online, fraudsters have followed users, porting their modus operandi - account takeover, social engineering, and malware based remote control attacks - to the mobile arena. Mobile has opened up many new ways for users to communicate and...
Government agencies face unique technology challenges in today's world, including complex legacy IT systems, antiquated processes and a prohibitive legislative budgeting cycle. Because of these challenges, many agencies are looking for creative new approaches to overcome the obstacles preventing adoption of the latest...
This monthly Security Agenda will highlight some of the most recent additions to our course library. This month's edition features Aetna's Jim Routh on the benefits of 'unconventional controls.' Another influencer, Phil Reitinger of the Global Cyber Alliance discusses email and credential security and how DMARC can...
Spear phishing is the common trigger to many of the most popular - and successful - targeted attacks. How can organizations improve their defenses to better spot - and stop - spear phishing?
Spear phishing and messaging-based threats tend to be the first attack vector that criminals are using today in targeted...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.