Shed a tear for enthusiasts of aging Microsoft Windows operating systems. That's because Microsoft has now retired Windows Server 2003 support, as well as anti-virus scanner and signature updates for Windows XP. But breaking up can be hard to do.
Firewalls and intrusion prevention systems don't provide sufficient protections for most public-facing websites or internal business-critical and custom Web applications.
Here, we explain how Web application firewalls help security leaders better protect Web applications in their organizations.
In-the-wild attacks have been found targeting at least one of two new zero-day Flash flaws leaked by Hacking Team's hacker. Separately, cyber-espionage APT attackers have been targeting a new Java flaw.
This document describes the business problems which privileged access management systems are intended to address. It goes on to describe best practices for defining and enforcing policies regarding discovering systems on which to secure access to sensitive accounts, updating and storing privileged passwords and...
Building a business case to justify fraud-prevention technology investments is, unfortunately, not as straightforward as one might expect. The impact of online fraud on a financial institution is multifaceted and complex. Fraud incidents and fraud-prevention efforts affect many aspects of the bank's services and...
You work hard to maintain your organization's reputation as a trusted financial advisor, and with good reason. Because many banks offer similar services and interest rates, one of your greatest differentiators, from your customers' perspective, is service.
Download this white paper to explore:
The need for an...
The European Central Bank (ECB) Recommendations For The Security Of Internet Payments sets forth numerous recommendations for European banks to enhance online fraud prevention practices. The ECB recommendations are more expansive and detailed, yet fundamentally similar to the US Federal Financial Institutions...
News headlines about the increasing frequency of stolen information and identity theft have focused awareness on data security breaches - and their consequences. In response to this issue, regulations have been enacted around the world. Although the specifics of the regulations may differ, failure to ensure compliance...
Given the potentially disastrous consequences of a breach, it is important for IT and security leaders to be aware that there are simple and extremely cost efficient steps that any organization can take immediately to improve protection and reduce risks.
How can your organization reduce risk by taking a proactive...
Data security presents a multidimensional challenge in today's complex IT environment. Multiple access paths and permission levels have resulted in a broad array of security threats and vulnerabilities. Traditional "fortress approaches" such as firewalls and IDS/IPS systems are no longer sufficient to defend against...
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and...
Organizations are eager to harness the power of big data. But as new big data opportunities emerge, ensuring the veracity and security of source information becomes
exponentially more difficult. If these challenges are not addressed directly, end users will lose confidence in the insights generated from big data. As...
Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.
In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
EMV Here We Come. Now that the U.S. has finally embraced secure-in-person transactions with EMV, we'll examine how the transition and the rollout will affect the rate of card-not-present (CNP) fraud and other online transactions. Join our panelists as we discuss such topics as how fraudsters will exploit the CNP...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.