Security management strategies News
April 08, 2015
Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.
March 27, 2015
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
March 12, 2015
A new Symantec report shows a significant fall in banking malware infections in 2014, but the company warns that malware remains a threat to financial firms.
February 16, 2015
A malware attack on more than 100 banks around the globe has led to one of the largest bank heist schemes in history, with losses potentially reaching $1 billion.
Security management strategies Get Started
Bring yourself up to speed with our introductory content
A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable. Continue Reading
A new variety of banking malware can sniff traffic from APIs. Enterprise threats expert Nick Lewis outlines how to mitigate the risk. Continue Reading
Security luminary and White Ops co-founder Dan Kaminsky reveals the one common tool employed by remote attackers that is leading to a new way to detect malware. Continue Reading
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Evaluate Security management strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
An SEC financial security report shows over three-quarters of financial institutions were subject to at least one cybersecurity attack. Expert Mike Chapple looks at common trends. Continue Reading
A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why. Continue Reading
'Bring your own key' services let customers hold onto their encryption keys, but is it really more secure? Expert Dan Sullivan explains. Continue Reading
Manage Security management strategies
Learn to apply best practices and optimize your operations.
Hiring privacy professionals for your enterprise can be a daunting task. Expert Mike O. Villegas explains the role and what qualities to look for in candidates. Continue Reading
Spotting unusual network traffic, like large amounts of encrypted data headed to suspicious domains, is key to better banking botnet detection. Continue Reading
Is your enterprise security intelligence and analysis fully optimized? Expert Nick Selby discusses threat intelligence and talks about some best practices. Continue Reading
Problem Solve Security management strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The Dridex banking Trojan has adopted new functionality to bypass virtual machines. Expert Nick Lewis discusses the enterprise controls to help detect and defend against the threat. Continue Reading
What particular risks does the OddJob Trojan pose to the security of financial transactions over the Web? Expert Nick Lewis explains. Continue Reading
Financial institutions need to monitor and recognize changes in employee behavior in order to detect potential insider fraud. Continue Reading