• Crowdsourcing your bug bounty program

    In this interview, David Levin, Director of Information Security at Western Union, talks about crowdsourcing their bug bounty program and the lessons learned along the way.

  • The multiple benefits of IT auditing

    Regulatory compliance requirements provide instructions for organizations on how to protect the data of their employees, business operations, and customers that are stored on their servers. The process of satisfying compliance requirements starts with IT auditing, performed either by an internal or external professional auditor using specialized software.

  • Behavioral biometrics: The password you can’t forget

    The boundaries of what defines a bank or payment provider are blurring, with innovators such as Apple and PayPal now competing in this space. These companies, which excel in customer service, are forcing the banks to consider how they can deliver the frictionless user experience that consumers now demand. That is, how they can balance the all-important triangle of privacy, convenience, and security.

  • Banks and IT security: The elements of success

    In this interview, Nathan Horn-Mitchem, VP, Information Security Officer at Provident Bank, talks about delivering and maintaining IT security for 80 branches of the bank, discusses how data breaches re-shaped their data protection strategies, and more.

  • Data lurking: How to protect your company against overlooked insider threats

    Enterprises often fear hackers as their number one security threat. However, they should be more scared of what happens internally. More often than not, data breaches come from employees or system errors, not outsiders.

    According to Ponemon’s 2013 Data Breach Report, human or system error is still the cause of 64 percent of data breaches. So the question remains – how can a company protect itself from an insider threat? Here are the worst internal offenders and solutions to make sure an employee doesn’t become an enemy.

  • Implementing an effective risk management framework

    In today’s marketplace, almost every employee is now a content contributor. Although beneficial to the collective of information available, this influx brings about new risk. Legal systems worldwide are clamping down and demanding greater compliance – particularly on IT systems – making it essential for organizations to implement compliance and risk management protocols. So how do we balance the benefit of the free flow of information with the risk of inappropriate access and/or disclosure? What are the consequences of not doing so?

  • Four advantages of an identity behavior-based approach to cybersecurity

    More and more companies are falling into the trap of buying a next-gen security system that still relies on today’s ineffective firewall, IPS, malware sandboxing system and security information and event management (SIEM) processes and technologies. Many believe that these next-gen tools will stop data breaches better than their predecessors, yet, year-over-year, we see an increase in the number of data breaches.

  • Protecting the critical infrastructure: Strategies, challenges and regulation

    In this interview, Raj Samani, VP and CTO EMEA at Intel Security, talks about successful information security strategies aimed at the critical infrastructure, government challenges, the role of regulation, and more.

  • Trumping cybercriminals during tax season: Tips on how to stay safe

    Tax season is stressful for many reasons and April 15 equals a headache for many Americans. In addition to wading through taxes, tax season also opens up a new vector in which cybercriminals can attack. With consumers sending and receiving very personal information over email – one of the weakest links in the cyber security fence – cybercriminals are on high alert, looking for the most opportune moment to strike.

  • Why you shouldn't ignore change auditing

    Rupesh Kumar is the Director of Lepide Software. In this interview, he discusses the benefits of change auditing.

Videos      Podcasts


Banking botnets persist despite takedowns

More than 90 percent of all Trojans targeted financial institutions located in US, followed by the UK, Germany, Italy, Spain and Australia.

Weekly newsletter

Reading our newsletter every Monday will keep you up-to-date with security news.

Daily digest

Receive a daily digest of the latest security news.

Fri, Apr 24th