The Open Enterprise is the new reality. Cloud and mobile have changed the business landscape, but have increased the challenge of security. This ebook will highlight some techniques and capabilities that are essential for enhancing security across the new Open Enterprise.
What you will learn:
How to...
Recent security breaches have been devastating to targeted companies, both financially and in terms of their corporate reputation. Many of these have been external attacks, but insiders often pose a more insidious risk.
This whitepaper describes how these attacks occur, and highlight key capabilities that can...
Fraud Summit - Chicago 2014 - Banking institutions face sophisticated fraud threats from multiple channels simultaneously, and traditional device and application controls are insufficient to provide security. Enter the concept of context-aware security, which leverages big data analytics among multiple layers of...
Fraud Summit - Chicago 2014 - What becomes of customer account information once it is stolen by fraudsters? It enters a sophisticated underground economy, where account names and numbers are sold openly in the criminal marketplace. Underground market trends often yield clues to undiscovered breaches or targets. Join...
Fraud Summit - Chicago 2014 - It has been nearly three years since the FFIEC issued updated guidance aimed in part at curtailing incidents of corporate account takeover. Yet, banking/security leaders today say their current anti-fraud investments have done little to reduce fraud incidents or losses. What do the...
Fraud Summit - Chicago 2014 - Mobile banking is still in its infancy, but experts predict it will soon be the dominant banking and payments channel. What are today's key mobile fraud and security risks, and how are they evolving? Register for this session to learn about:
The risks inherent in mobile...
Fraud Summit - Chicago 2014 - Payment Card fraud remains a top challenge for financial institutions. The latest wrinkle: Breached retailers such as Target and Neiman Marcus, whose compromises led to wholesale card fraud. Register for this session and learn:
The American Bankers Association's view of how...
Fraud Summit - Chicago 2014 - You know today's hottest fraud threats. But what are the emerging schemes that should concern you? Which anti-fraud technologies should you be testing? Where are the potential legal traps to avoid? In this session from ISMG's Chicago Fraud Summit, Gartner's Avivah Litan and attorney...
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Timely analysis of data residing in an organization's information systems is a critical element of IT security, say Haiyan Song and Joe Goldberg of the security firm Splunk.
DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are still not aware of the growing threat posed by DDoS attacks, nor are they...
Symantec is revamping its security offerings, and a company executive says that the market for anti-virus apps "is dead." Security experts weigh in on the future of threat mitigation.
Security experts say a newly reported flaw in open-source authorization services, which has been named Covert Redirect, doesn't appear to pose as big a risk as the Heartbleed bug.
A White House working group exploring big data and privacy has proposed that Congress enact a national data breach notification law and strengthen the government's role in cybersecurity.
For too long, code writers have been measured on the features built into their applications - not the potential security vulnerabilities. It's time to change that perspective, says Maty Siman of Checkmarx.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.