With hack attacks continuing against banks, SWIFT must follow in the footsteps of other vendors - notably Microsoft - and begin offering detailed, prescriptive security guidance to its users, says Doug Gourlay of Skyport Systems.
Security teams face increasing pressure from management to prevent breaches, discover attacks faster, and
become more efficient. Most will not succeed because the security infrastructures they have in place do not work
against most of the advanced persistent threats organizations face today.
Download this white...
Novetta Cyber Analytics is an advanced network-traffic analytics solution that empowers analysts with comprehensive, near real-time
cyber security visibility and awareness, filling a critical gap in today's enterprise cyber security toolset. With queries that take only
seconds - even at Petabyte network traffic...
Vietnam's TPBank says it successfully foiled more than $1 million in fraudulent transfer requests apparently initiated by the same hackers who targeted Bangladesh Bank and other SWIFT-using institutions with PDF reader malware.
The theft of $81 million from Bangladesh Bank was "part of a wider and highly adaptive campaign targeting banks," SWIFT warns its 11,000 customers. Investigators say signs point to the same attackers having hacked Sony Pictures Entertainment in 2014.
Amidst finger-pointing over responsibility for the $81 million online theft from Bangladesh Bank, SWIFT has issued its first-ever information security guidance to banks, telling them that they're responsible for securing their own systems.
The U.S. government is actively disrupting - rather than just monitoring - computer systems, networks and communications technologies used by the jihadi fighters known as ISIS, ISIL or Daesh, according to a news report.
Epic Systems' successful lawsuit against India's Tata Consultancy Services raises many security questions. For example, why did Epic find out about the allegedly inappropriate downloading of trade secrets from an external whistleblower, rather than as a result of internal detection efforts?
Backed by its own logo, Badlock refers to a set of critical Samba vulnerabilities in Windows and most Unix/Linux operating systems, which attackers could exploit to launch man-in-the-middle attacks against corporate networks.
The massive "Panama Papers" data leak apparently was enabled by a law firm failing to have the right information security defenses in place. The breach calls attention to the need for all organizations to encrypt sensitive data, use access controls as well as monitor access patterns for signs of data exfiltration.
In the world of the extended enterprise, everybody seeks greater visibility into network activity. But Gidi Cohen was there in 2002, founding Skybox Security to provide analytics to improve cybersecurity. Cohen discusses the evolution of visibility.
The 2016 Firewall Management Trends Report analyzes the findings of a Skybox survey of IT professionals from more than 300 enterprises and government agencies worldwide. See what tools and methods peers are using today to manage increasing network complexity and how they plan to tackle it in the future.
Improve your network security management with 4 essential best practices that enhance network visibility, security management, risk analysis, and change management processes. Network security management is a balancing act, you need the agility to expand the network to support critical services while at the same time...
With a large volume of changes cycling through the network on any given day, it's impossible to maintain security and compliance without an intelligent, standardized workflow. A closed-loop change management process will dramatically reduce associated time and costs, ensure changes won't introduce new risk and verify...
We all realize that the black hats are typically a step ahead of the white hats. But do we accept that our own security controls are contributing to the deficit? Sam Curry of Arbor Networks describes how security leaders can regain their lead in this video interview.