New & Notable
Security management strategies News
February 23, 2018
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more.
October 14, 2016
The Odinaff banking Trojan has been found targeting the SWIFT messaging system at financial institutions around the world and may have links to the infamous Carbanak group.
April 08, 2015
Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.
March 27, 2015
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
Security management strategies Get Started
Bring yourself up to speed with our introductory content
Personally identifiable information (PII) is any data that could potentially identify a specific individual. Continue Reading
Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components. Continue Reading
Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS). Continue Reading
Evaluate Security management strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Microsoft augments the native protection features in its newer Windows Server releases with cloud-based security products to reduce the likelihood of a successful breach attempt. Continue Reading
Microsoft Hyper-V on Windows comes with advanced protection schemes, including several virtualization-based security features the company introduced in Windows Server 2019. Continue Reading
Learn which approaches an organization can take -- including using a single provider, a managed partnership or DIY -- when implementing their business continuity and disaster recovery strategy. Continue Reading
Manage Security management strategies
Learn to apply best practices and optimize your operations.
If you find your systems locked up from a ransomware attack, what should you prioritize? Before you start your recovery, follow this plan to avoid additional trouble. Continue Reading
Researchers from Positive Technologies found flaws affecting NCR ATMs. Discover how these ATM vulnerabilities work and how a patch can mitigate this attack. Continue Reading
Problem Solve Security management strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
When security expert Steven Murdoch received an email phishing attempt, the researcher in him decided to investigate. Find out what he learned about criminal phishing tactics. Continue Reading
The BitLocker encryption technology continues to evolve from its roots as a Windows Vista feature to protect resources both in the local data center and in the Azure cloud platform. Continue Reading
No one product can prevent every ransomware attack, but there are several defensive practices Windows administrators can take to stop an encryption infection from ruining their day. Continue Reading