Warning: Attackers behind the recently revealed Facebook mega-breach may still be able to access victims' accounts at some third-party web services and mobile apps, and Facebook has offered no timeline for when a full lockdown might occur - although there are no signs of third-party account takeovers.
Artificial intelligence and machine learning will have a significant impact on lowering the cost of securing an organization because it will reduce the need for advanced skillsets, predicts Rapid7's Richard Moseley.
An ongoing security operations center challenge is trying to get the right data to the right person at the right time. The problem is compounded by there being "too much data and not finding the right people to deal with the data," says Mischa Peters of IntSights. What can help?
Numerous technology firms now offer facial biometrics recognition search tools for big data sets. But information security expert Alan Woodward warns that these big data sets must be "considered and regulated very heavily" or else we'll be "living in 1984 without knowing it."
A computer security researcher has discovered a vast marketing database containing 340 million records on U.S. consumers. The database is the latest in a long line of databases to have been left exposed to the internet without authentication, thus putting people's personal data at risk.
Hybrid cloud adoption is accelerating within the financial services industry and few organizations have a solid understanding of how to secure hybrid cloud.
Most companies employ an array of cloud services from an array of providers, each with its own set of security controls, frameworks and products that increase...
The regulator and legislative fallout of the global financial crisis continues to place intense pressure on the financial industry.
Not only is the volume of regulations growing, so is their complexity a result of the diverse and inconsistent array of regional and jurisdictional mandates being imposed on financial...
As big-data analytics matures, it will play a bigger role, but security information and event management software, or SIEMs, will also remain essential, contends Gary Warner, director of research in computer forensics at the University of Alabama at Birmingham.
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells.
Download this eBook interview transcript with Laurence Pitt of Juniper Networks and learn about:
Data's true value in today's economy;
How organizations are exposing...
It is said that "Data is the new oil." If that's the case, then organizations need to do a far better job inventorying and securing their wells, says Laurence Pitt of Juniper Networks. He offers insights on leveraging and securing data.
As digital threats grow more numerous and perpetrators become savvier, you can't defend your network by taking the traditional, physical approach to IT security. Standard perimeter firewalls aren't designed to protect your critical workloads once an attack makes it inside the data center, and the "firewall-everything"...
Traditional approaches to securing data centers have focused on strong perimeter defenses to keep threats outside the network. Once attackers are inside, it's difficult to stop them.
Download this infographic and learn how to:
Divide the data center into distinct security segments;
Transform your data center with...
The latest statistics on data center breaches show that perimeter firewalls are still not impenetrable. But what cyber criminals count on is what they will find beyond the perimeter - a hardware-centric security model that has remained unchanged for years.
Download this whitepaper and learn:
Traditional perimeter-centric data center security strategies are no longer effective against today's malicious and highly sophisticated attacks. While tremendous effort, resources, and technology are applied to securing the perimeter of the data center, until recently, nothing resembling that same level of thought...