Information security technology management
New & Notable



6 Steps for Effective Information Security Assessments
Assess your organization’s security risks with this checklist. Expert Kevin Beaver explains the 6 key components of the process.
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
Information security technology management News
-
July 25, 2017
25
Jul'17
G Suite feature for whitelisting apps helps IT protect data
Google G Suite and other cloud services use app whitelisting to prevent untrusted third-party applications from accessing and exposing critical data.
-
July 01, 2015
01
Jul'15
Fobber: Drive-by financial malware returns with new tricks
Drive-by financial malware Fobber is the evolution of the popular Tinba -- with better encryption, a newer format and a focus on the Netherlands.
-
June 28, 2012
28
Jun'12
Operation High Roller: Online bank fraud
McAfee and Guardian Analytics released the findings of an investigation into a global online bank fraud ring that takes the old techniques up a notch.
-
April 01, 2011
01
Apr'11
SIEM vendors make the case for extending SIEM product capabilities
Advanced features can reduce the threat of wire fraud. New rule sets can be shared among banks and credit unions.
Information security technology management Get Started
Bring yourself up to speed with our introductory content
-
blockchain economy
The blockchain economy is a scenario and potential future environment in which the technology replaces current monetary systems, potentially on a global basis. Continue Reading
-
digital currency
A digital currency is a medium of exchange that is generated, stored and transferred electronically. Continue Reading
-
Close ranks with key Office 365 security features
Security practices that work on premises won't translate to the cloud. Office 365 admins need to use the platform's protection features to stop advanced attacks. Continue Reading
Evaluate Information security technology management Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Why your company needs the Payment Card Industry Data Security Standard
If you think Payment Card Industry Data Security Standard is just for merchants, think again. Here's why virtually every company can boost security and address risk issues using PCI DSS. Continue Reading
-
Why should CFOs care about blockchain technology?
Blockchain technology applications have generated a buzz among many industries, and those connected to finance stand to gain -- and be changed -- the most. Here's a quick look at why blockchain matters. Continue Reading
-
How does the M-Pesa service work and what are the risks?
How does mobile microfinancing service M-Pesa allow users to make transactions without a bank account? Expert Michael Cobb explains how it works and M-Pesa security measures. Continue Reading
Manage Information security technology management
Learn to apply best practices and optimize your operations.
-
Exchange hybrid arrangement adds management complexity
On-premises Exchange Server and Office 365 can make a great team -- if admins pay attention to certain features and adjust management practices accordingly. Continue Reading
-
What do CFOs need to know about customer data security?
With cyberattacks a growing concern for many companies, the CFO must take a leadership role in securing organizational and customer data. Here's how to start. Continue Reading
-
Neglected cloud app security is among major SaaS security issues
A report from Adallom highlights the lack of SaaS security in enterprises, but expert Dave Shackleford has ways to take back the cloud and lessen the risks, such as enhanced cloud app security. Continue Reading
Problem Solve Information security technology management Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Exchange IRM helps enterprises lock down information
Exchange Server's information rights management features put boundaries on messages and documents to avoid the mishandling of restricted content. Continue Reading
-
Evolution of online banking malware: Tatanarg Trojan and OddJob Trojan
Online banking credentials are one of the most lucrative bits of information available to steal. Expert Nick Lewis advises how to keep cutting-edge Trojans off company machines. Continue Reading
-
OddJob Trojan: Different from other online security banking threats?
What particular risks does the OddJob Trojan pose to the security of financial transactions over the Web? Expert Nick Lewis explains. Continue Reading