Point-of-sale retail breaches are the rage, but they are just one cyber-crime trend on the mind of RSA researcher Uri Fleyder. What are the malware and mobile threats that organizations should monitor?
Attacks are more frequent, severe and complex. How can security pros defend against the entire attack continuum - before, during and after? Cisco's Bret Hartman describes a threat-centric approach.
To detect and deter today's threats, security teams need new and dynamic data analytics capabilities. Haiyan Song of Splunk discusses the analytics-enabled SOC and how to improve incident response.
"United we stand; divided we fall." That's the message from Art Coviello to kick off the 2014 RSA Conference Asia Pacific & Japan in Singapore. What advice does the RSA chair offer to global security leaders?
One key factor in efforts to reduce reliance on passwords for authentication will be international acceptance of the FIDO Alliance's soon-to-be released protocol for advanced authentication, says Michael Barrett, the alliance's president.
As content sharing via mobile devices becomes more common, organizations must make sure security issues are adequately addressed, says Hormazd Romer, senior director of product marketing at Accellion.
As organizations expand their use of encryption to help prevent breaches, they must improve their management of cryptographic keys, says Prakash Panjwani, senior vice president at SafeNet.
While massive DDoS attacks were dominant in 2013, this year, smaller application-layer attacks going after such things as log-in pages and password files are far more common, says Rich Bolstridge, chief strategist, financial services, at Akamai Technologies.
From managers who steal to innocent employees who are duped, the insider threat is evolving. Researchers Dawn Cappelli and Randy Trzeciak share their latest insight on malicious and accidental insider risks.
Four years after the Commission on Cybersecurity for the 44th Presidency, the panel's co-chair - Harry Raduege - is cautiously optimistic that many of its recommendations could be adopted in 2013.
Intrusion detection is challenging for most organizations, and hackers' ever-increasing skill to evade monitoring tools only compounds the problem. But Zions Bank's Michael Fowkes says big data can help.
An evolving concept known as "intelligent security" involves using a combination of technologies to detect threats, helping security professionals become more proactive. Learn how pioneers are using the new approach.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.