New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Information security technology management News
July 25, 2017
Google G Suite and other cloud services use app whitelisting to prevent untrusted third-party applications from accessing and exposing critical data.
July 01, 2015
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
June 28, 2012
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.
April 01, 2011
Advanced features can reduce the threat of wire fraud. New rule sets can be shared among banks and credit unions.
Information security technology management Get Started
Bring yourself up to speed with our introductory content
The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis. Continue Reading
A digital currency is a medium of exchange that is generated, stored and transferred electronically. Continue Reading
Security practices that work on premises won't translate to the cloud. Office 365 admins need to use the platform's protection features to stop advanced attacks. Continue Reading
Evaluate Information security technology management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
If you think Payment Card Industry Data Security Standard is just for merchants, think again. Here's why virtually every company can boost security and address risk issues using PCI DSS. Continue Reading
Blockchain technology applications have generated a buzz among many industries, and those connected to finance stand to gain -- and be changed -- the most. Here's a quick look at why blockchain matters. Continue Reading
How does mobile microfinancing service M-Pesa allow users to make transactions without a bank account? Expert Michael Cobb explains how it works and M-Pesa security measures. Continue Reading
Manage Information security technology management
Learn to apply best practices and optimize your operations.
On-premises Exchange Server and Office 365 can make a great team -- if admins pay attention to certain features and adjust management practices accordingly. Continue Reading
With cyberattacks a growing concern for many companies, the CFO must take a leadership role in securing organizational and customer data. Here's how to start. Continue Reading
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
Problem Solve Information security technology management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content. Continue Reading
Online banking credentials are one of the most lucrative bits of information available to steal. Expert Nick Lewis advises how to keep cutting-edge Trojans off company machines. Continue Reading
What particular risks does the OddJob Trojan pose to the security of financial transactions over the Web? Expert Nick Lewis explains. Continue Reading