Security teams commonly lament that reducing fraud in the enterprise would be a whole lot more effective if only the products could understand the business better. This is especially true with websites, the primary interface of the business with customers, partners and employees.
Account takeover, automated...
Most organizations have embraced more than one software platform to automate their critical business processes. Platforms are becoming more flexible, allowing users to customize or configure their own applications. As your use cases grow, you may question whether you should leverage an existing platform for your next...
The FBI has arrested Chinese national Yu Pingan on charges that he was a "malware broker" for a remote-access Trojan called Sakula that was used in the massive breaches of Anthem and the U.S. Office of Personnel Management, among other organizations.
Philips plans to fix alarming vulnerabilities in a web-based application used to track patient radiation exposure. Versions of the DoseWise Portal mistakenly shipped with errors, including hard-coded credentials for a database and lack of encryption for patient data.
Too often card-issuing banks suffer significant losses from fraudsters stealing credit card credentials. Typically, these fraudsters use multiple cards from various issuers to complete purchases from a single device before the stolen cards can be blocked. The goal for banks is to immediately identify and stop these...
Traditional approaches to securing data centers have focused on strong perimeter defenses to keep threats outside the network. Once attackers are inside, it's difficult to stop them.
Download this infographic and learn how to:
Divide the data center into distinct security segments;
Transform your data center with...
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Why micro-segmentation...
Ransomware is a rapidly evolving challenge for organizations of all sizes. Despite expert protection technologies and staff, attackers are consistently changing techniques and developing bolder strategies that creep through vulnerabilities. Although the majority of ransomware attacks are spread by email through...
The British security researcher credited with stopping the WannaCry ransomware outbreak pleaded not guilty Monday to charges that he developed and sold a type of malicious software that steals online banking credentials.
Security expert Troy Hunt has released a massive data set of compromised passwords that's intended to help web services steer users away from picking those that have already been exposed in data breaches.
Security is consistently growing more important, and many IT teams are recognizing it as both a priority and a challenge. In addition, IT teams are under increasing pressure to protect the business from emerging new threats. For organizations that are embracing cloud and virtualized environments, three common-sense...
Digital transformation represents a massive opportunity for your business. But with this opportunity comes risk and increased security threats for IT organizations. Read the eBook to learn how by rethinking your approach to IT security, you can answer this modern security challenge.
VMware and Intel transform...
Hackers have struck Hollywood again, claiming HBO as their latest victim. So far, some unaired programming has been leaked online, as have details relating to a forthcoming "Game of Thrones" episode - but no actual episodes.
Health insurer Anthem Inc., still dealing with the aftermath of a 2015 cyberattack that impacted nearly 79 million individuals, now is coping with another - albeit smaller - breach incident. This one involves a business associate's former employee who's currently incarcerated.
Two Iranian nationals remain at large after being charged by the U.S. Department of Justice with hacking into a Vermont-based engineering firm and stealing software used to develop projectiles, ranging from bullets to GPS-guided artillery shells and missiles.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.