Security management strategies
New & Notable



Download Now: 3 Ways SOAR Can Combat the Cybersecurity Skills Shortage
What are some of the strategies that your organization has implemented to help combat the cybersecurity skills gap? Mike Chapple, senior director of IT at University of Notre Dame explains how log processing, threat intelligence and account lifecycle management can help alleviate the shortage of qualified pros and have teams work smarter, not harder.
Security management strategies News
-
February 23, 2018
23
Feb'18
Hackers used SWIFT-based attacks to steal millions from banks
News roundup: Hackers once again used SWIFT-based attacks to steal millions from Russian and Indian banks. Plus, hackers used an L.A. Times website for cryptojacking, and more.
-
October 14, 2016
14
Oct'16
Odinaff banking Trojan linked to Carbanak group, attacks SWIFT
The Odinaff banking Trojan has been found targeting the SWIFT messaging system at financial institutions around the world and may have links to the infamous Carbanak group.
-
April 08, 2015
08
Apr'15
Dyre malware returns to rob banks of millions
Financial malware Dyre, in tandem with social engineering, was used in a new campaign to steal millions from financial institutions, according to IBM researchers.
-
March 27, 2015
27
Mar'15
Vawtrak's back: Multilayered banking Trojan reemerges
Heimdal Security researchers have found new cases of the nesting-doll financial malware, while Fortinet researchers peel back the layers to reveal its surprising intricacies.
Security management strategies Get Started
Bring yourself up to speed with our introductory content
-
Governance, Risk and Compliance (GRC)
Governance, risk and compliance (GRC) is a combined area of focus developed to cover an organization's strategy to handle any interdependencies between the three components. Continue Reading
-
card skimming
Card skimming is the theft of credit and debit card data and PIN numbers when the user is at an automated teller machine (ATM) or point of sale (POS). Continue Reading
-
file shredder
A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable. Continue Reading
Evaluate Security management strategies Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
-
Explore Office 365 phishing protection updates
Administrators who move to Exchange Online or the entire Office 365 platform will have a veritable arsenal of antiphishing tools, but their use requires attention to detail. Continue Reading
-
What are the key takeaways from the SEC financial security report?
An SEC financial security report shows over three-quarters of financial institutions were subject to at least one cybersecurity attack. Expert Mike Chapple looks at common trends. Continue Reading
-
Why financial organizations need a strong cloud security strategy
A cloud security strategy is critical for financial organizations, but many in the industry are dragging their feet. Expert Dave Shackleford explains why. Continue Reading
Manage Security management strategies
Learn to apply best practices and optimize your operations.
-
How was a credit card skimmer used to steal data from Newegg?
Researchers believe that malicious JavaScript code was used to steal credit card data from online retailer Newegg. Learn more about this attack with Judith Myerson. Continue Reading
-
How was a black box attack used to exploit ATM vulnerabilities?
Researchers from Positive Technologies found flaws affecting NCR ATMs. Discover how these ATM vulnerabilities work and how a patch can mitigate this attack. Continue Reading
-
How is the Trezor cryptocurrency online wallet under attack?
A phishing campaign targeting Trezor wallets may have poisoned DNS or hijacked BGP to gain access. Learn how the attack worked and how to mitigate it with expert Nick Lewis. Continue Reading
Problem Solve Security management strategies Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
-
Tips for ransomware protection on Windows systems
No one product can prevent every ransomware attack, but there are several defensive practices Windows administrators can take to stop an encryption infection from ruining their day. Continue Reading
-
How is SamSam ransomware using a manual attack process?
Sophos researchers believe the SamSam ransomware campaign could be the work of one or a few threat actors using manual techniques. Learn how it works and if recovery is possible. Continue Reading
-
How were attackers able to bypass 2FA in a Reddit breach?
Reddit announced a breach after users were socially engineered and attackers bypassed 2FA protocols. Discover how this attack was possible and how sites can avoid falling victim. Continue Reading