The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
Today's DNS infrastructure requires greater security measures to protect companies from dangerous and costly fraudulent activities. This whitepaper summarizes the variety of activities that put today's DNS infrastructures at risk, and explores the key benefits of deploying a DNS Security Extension (DNSSEC) for added...
DNSSEC adds critically needed trust to the DNS, but deploying DNSSEC can be complex, time consuming and error prone. This whitepaper shows how Secure64 DNS Signer provides a simple, scalable, and secure solution for DNSSEC deployment.
Download this whitepaper to learn about:
A variety of Secure64 DNS Signer...
This whitepaper guides you in setting up your DNSSEC key and signing policies that are right for your organization, and summarizes the advantages and disadvantages of three different approaches to deploying DNSSEC: do-it-yourself with software, do-it-yourself with a hardware-security module (HSM), and automated...
This flyer provides an overview of how deploying a Secure64 DNS Signer solution with HP provides you with a power, flexible solution that meets your business needs today and dynamically adapts as those needs change.
Downloading this asset will help you:
See how HP and Seure64 DNS Signer can make your DNSSEC...
The FDIC says the number of banks on its "Problem List" dropped during the second quarter of 2011, the first quarter-to-quarter decrease since 2006. But the failure respite could be short-lived, if the economy falls back in to recession.
Organizations entering into a contract with a cloud computing vendor need to have a clear understanding of how the vendor operates before signing off on their services, says Chris Witt of Wake Technology Services Inc.
The bright spot is that 36 percent of the takeover incidents reported in 2010 were stopped before fraudulent funds transfers were approved. That's an improvement from 2009, when only 20 percent were thwarted.
Fraud is a global concern, and an area regulators and financial institutions the world-over are watching closely, says Bill Isaac. Whether a cyberthreat or mortgage fraud, investments in fraud prevention will continue, despite the state of the international economy.
In many states, the top information security officer champions IT security rather than dictates it, as the decisions of specific steps to take to safeguard digital assets are left to departments, agencies and commissions.
Preliminary results of our inaugural Healthcare Information Security Today survey, which is still open for participation, show that only about half of healthcare organizations have a plan in place to comply with the HITECH Act breach notification rule.
Banks and commercial customers are more often working together, enabling them to catch and stop fraudulent requests for funds transfers before commercial accounts are drained.
Don't miss your opportunity to participate in the Healthcare Information Security Today survey. Preliminary results show that about 40 percent of healthcare organizations rate their ability to counter security threats as poor, failing or in need of improvement.
"We face a broad threat ... and each consumer has to understand that their part in protecting both their own finances and the financial infrastructure, together, is a very large part," says Ian Harper, Pentagon Federal Credit Union.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.