With advanced persistent threats on the rise many organizations are looking for next-gen endpoint solutions to protect their users and devices. But with the majority of vendors claiming to offer next-gen solutions it can be difficult to separate the 'must have' features from the merely average. Add in confusing and...
With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Ransomware, regulations, botnets, information sharing and policing strategies were just some of the topics that dominated the "International Conference on Big Data in Cyber Security" hosted by Edinburgh Napier University in Scotland.
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
Amidst finger-pointing over responsibility for the $81 million online theft from Bangladesh Bank, SWIFT has issued its first-ever information security guidance to banks, telling them that they're responsible for securing their own systems.
The online heist of $81 million from Bangladesh Bank involved custom malware that hacked the database used by the bank's SWIFT software, allowing attackers to transfer money and hide their tracks, according to BAE Systems Applied Intelligence. SWIFT will issue software updates and security guidance to all customers.
Attackers have been exploiting JBoss application servers to install remote-control web shells as part of a campaign that targets enterprises with network-hopping SamSam (a.k.a. Samas) ransomware, researchers at Cisco Talos warn.
Recent attacks have shown that once a user's endpoint is infected with advanced malware, criminals can bypass most security layers, including two-factor authentication, device ID systems, risk engines and behavioral analytic systems. Banking malware such as Citadel, Zeus, Dyre and Bugat, incorporate advanced...
By allowing connections to multiple endpoint platform types, financial institutions are tasked with providing a secure transaction channel to a massive number of devices they don't own and have limited control over. Meanwhile, cybercriminals develop new attacks targeted directly at this type of communication every...
Cybercriminals have the bandwidth and technical skills to focus on stealing your organization's sensitive data and they are targeting your endpoints and servers. Often leveraging vulnerabilities in software already running on a system, then are able to gain access and establish persistence on
a machine....
Security professionals trust encryption to protect data and meet regulatory requirements. Forrester conducted a 52 point criteria evaluation of the leading endpoint encryption vendors, and named Sophos Safeguard Encryption "breakout star."
Download this report for a comparison of competing vendors including...
It takes more than antivirus to stop today's advanced threats. Explore how the top endpoint vendors (by market share and industry analysis) stack up against your organization's endpoint security needs with this endpoint protection buyers guide.
Download this guide to compare solutions from Sophos, Kaspersky,...
Webroot has just released its 2016 edition of its annual threat brief. In an exclusive interview, Michael Malloy, executive vice president of products and strategy, discusses the report and how its key findings will likely play out in the year ahead.
Healthcare organizations must take several important steps to protect their environments against ransomware attacks, says Mac McMillan, CEO of the security consulting firm CynergisTek. He outlines key measures in this interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.