Advanced threats require an advanced security strategy. Oliver Friedrichs of Sourcefire recommends a threat-centric security approach. In this interview, he explains exactly what that entails.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
The dynamic evolution of financial fraud creates new opportunities for defensive strategies that employ big data and analytics. Terry Austin of Guardian Analytics discusses new threats and solutions.
Paige Leidig, chief marketing officer of CipherCloud, says information protection requirements continue to be the primary hurdle for enterprise adoption, despite explosive growth in the cloud content and collaboration market and its evident advantages to productivity and cost efficiencies.
Call center fraud is increasing, and it's not just financial institutions feeling the pain, says Pindrop Security's Matt Anthony. Now, a database of phone numbers aims to help organizations mitigate risks.
Because managing identities is a global problem, it requires a global solution, says Paul Simmonds of the Jericho Forum. A new organization has been established to address global identity. Simmonds offers insight.
How is the six-hospital Barnabas Health delivery system tackling the challenge of complying with the new HIPAA Omnibus rule? Hussein Syed, director of IT security, explains.
U.S. banks have been hit by a new wave of distributed-denial-of-service attacks, and experts say the botnet behind the attacks is getting stronger. Learn about the latest developments.
Hear from Julia Bernal, Group Business Security & Data Protection Manager of Friends Life in the United Kingdom talk about how they were able to deploy an access governance solution in 17 days from initial implementation until first live access review.
CISOs looking for a way to build credibility with senior executives - and win funding for important projects - need to drop the "just say no" approach and build a reputation as a team player, says security professor Ray Davidson.
Our RSA panel features the NIST thought-leader responsible for its information risk publications along with top IT security practitioners who take NIST guidance and make it work. See how they do it.
IBM, Lockheed Martin and Fixmo are among the organizations to issue product/solution news releases in advance of RSA Conference 2013. See the latest announcements for the show.
A new report by ENISA identifies the top security threats impacting organizations worldwide in 2013. The agency's Louis Marinos explains how such information can lead to improved risk assessments.
RSA Conference 2013 opens Feb. 25 in San Francisco, and for the fourth straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda of this world-class security event?
Mobile security, advanced persistent threat and DDoS attacks on banks have been among the hottest security stories. How have they influenced RSA Conference 2013? Program Chair Hugh Thompson previews the event.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.