In the past year, so-called business email compromise attacks, also known as "masquerading" and "executive impersonation," have emerged as one of the banking industry's greatest wire fraud worries. These schemes threaten to overshadow what the industry previously saw from commercial account takeover incidents.
In...
EMV Here We Come. Now that the U.S. has finally embraced secure-in-person transactions with EMV, we'll examine how the transition and the rollout will affect the rate of card-not-present (CNP) fraud and other online transactions. Join our panelists as we discuss such topics as how fraudsters will exploit the CNP...
Highly publicized payment card breaches affected millions of consumers in 2014. In the wake of these breaches, retailers, financial institutions, payment processors and credit card brands responsible for delivering these systems in the United States are facing more scrutiny than ever before and are meeting at a...
Recent high-profile breaches at nationwide retail, healthcare, entertainment, public sector and financial service organizations has brought heightened attention from lawmakers in Congress and the Obama Administration. This growing focus on cybersecurity and data breaches, coupled with a growing sense of...
Threat intelligence is only useful if you can take action quickly to protect networks, systems and data. Organizations today are challenged with a high volume of security
events produced by the ecosystem of their non-collaborative security solutions. It is not a question of receiving intel on attacks, but rather:...
Without an iota of doubt one could say enterprises at large are fraught with the challenges of dealing with the multitude of common and advanced malware attacks. As a security professional you have been constantly grappling with challenges in identifying attacks, let alone spotting the most dangerous ones.
And the...
FBI Director James Comey says he has faith in American technological ingenuity to overcome obstacles and give law enforcement the ability to access and decrypt data on the devices of criminals and terrorists.
Warning: All versions of Flash Player are vulnerable to a zero-day, weaponized exploit that became public when Italian spyware vendor Hacking Team was hacked, and 400 GB of corporate data leaked. Adobe has released an update to patch the flaw.
A dozen well-known cryptographers and information security specialists have published a paper explaining why they believe it's unfeasible to create a so-called "backdoor" to allow law enforcement to decrypt encoded information.
OpenDNS's Andrew Hay sees danger confronting many enterprises in the era of the "Internet of Things" as Internet-ready consumer devices, not architected for security, find their way onto corporate networks, often unbeknown to administrators.
Enterprise mobility management suites are the glue that connects mobile devices to their enterprise workflow. End-user computing leaders must consider short-term and long-term objectives amid rapid market changes.
Download this matrix to explore how the market leaders compare.
Infrastructure and operations (I&O) professionals face a difficult mandate: Enable the workforce to navigate the ever-changing landscape of mobile scenarios while continually ensuring that their company's compliance and security needs are met. Mobile device management (MDM) solutions are effective tools to help...
The market for enterprise mobile management software has evolved from a primary focus on MDM to a suite that includes MDM, MAM and MCM as the primary capabilities. This Aragon Research Globe reviews 18 major technology providers in EMM and their strengths and challenges as this market transforms.
Download this...
Organizations of all shapes and sizes around the world have been faced with an influx of mobile devices over recent years. The increasing processing power and affordability of smartphones and tablets means that business users want to and are easily able to use them as part of their everyday working lives: Ovum's...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.