New & Notable
Information security technology management News
July 25, 2017
Google G Suite and other cloud services use app whitelisting to prevent untrusted third-party applications from accessing and exposing critical data.
July 01, 2015
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
June 28, 2012
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.
April 01, 2011
Advanced features can reduce the threat of wire fraud. New rule sets can be shared among banks and credit unions.
Information security technology management Get Started
Bring yourself up to speed with our introductory content
With help from the combined use of the SPF, DKIM and DMARC technologies, Exchange administrators can curb email spoofing to protect users and the company brand. Continue Reading
A Bitcoin ATM is an automated teller machine that lets users buy, sell and transfer the cryptocurrency, just as regular ATMs provide financial services related to traditional currencies. Continue Reading
A company that moves to Exchange Online must coordinate the efforts of its email administrators and its security team to maximize protections and meet compliance requirements. Continue Reading
Evaluate Information security technology management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If you think Payment Card Industry Data Security Standard is just for merchants, think again. Here's why virtually every company can boost security and address risk issues using PCI DSS. Continue Reading
Blockchain technology applications have generated a buzz among many industries, and those connected to finance stand to gain -- and be changed -- the most. Here's a quick look at why blockchain matters. Continue Reading
How does mobile microfinancing service M-Pesa allow users to make transactions without a bank account? Expert Michael Cobb explains how it works and M-Pesa security measures. Continue Reading
Manage Information security technology management
Learn to apply best practices and optimize your operations.
Stay on top of any potential problems with your Office 365 deployment through the monitoring dashboard and a break glass account to avoid Azure authentication outages. Continue Reading
The Signal Desktop application was found to be making decryption keys available in plaintext. Learn how the SQLite database and plaintext passwords were put at risk. Continue Reading
A report on cybercrime shows a rise in banking Trojans, such as Emotet, targeting businesses over consumers. Malwarebytes' Adam Kujawa shares his thoughts on what's behind this shift. Continue Reading
Problem Solve Information security technology management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
Online banking credentials are one of the most lucrative bits of information available to steal. Expert Nick Lewis advises how to keep cutting-edge Trojans off company machines. Continue Reading