New & Notable
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Security management strategies News
February 23, 2018
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more.
October 14, 2016
The Odinaff banking Trojan has been found targeting the SWIFT messaging system at financial institutions around the world and may have links to the infamous Carbanak group.
April 08, 2015
Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.
March 27, 2015
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
Security management strategies Get Started
Bring yourself up to speed with our introductory content
Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS). Continue Reading
A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable. Continue Reading
A new variety of banking malware can sniff traffic from APIs. Enterprise threats expert Nick Lewis outlines how to mitigate the risk. Continue Reading
Evaluate Security management strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
An SEC financial security report shows over three-quarters of financial institutions were subject to at least one cybersecurity attack. Expert Mike Chapple looks at common trends. Continue Reading
A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why. Continue Reading
'Bring your own key' services let customers hold onto their encryption keys, but is it really more secure? Expert Dan Sullivan explains. Continue Reading
Manage Security management strategies
Learn to apply best practices and optimize your operations.
Each enterprise has different needs when it comes to preventing data leakage. Admins should be aware of the Office 365 mailbox and encryption features that help the organization meet its requirements. Continue Reading
Risk analytics tools are more and more critical for CFOs seeking to improve operational efficiency. Just one problem: It can be hard to figure out just what those tools are. Continue Reading
SWIFT banking has a team dedicated to data breach investigations. Expert Mike O. Villegas discusses why this is necessary and whether other organizations should follow suit. Continue Reading
Problem Solve Security management strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Jon Callas explains how strong the Triple DES symmetric encryption algorithm actually is and offers guidance on how it compares to other widely used block ciphers. Continue Reading
The Dridex banking Trojan has adopted new functionality to bypass virtual machines. Expert Nick Lewis discusses the enterprise controls to help detect and defend against the threat. Continue Reading
Hiring privacy professionals for your enterprise can be a daunting task. Expert Mike O. Villegas explains the role and what qualities to look for in candidates. Continue Reading