Profile

Cover photo
SearchFinancialSecurity.com
79 followers|3,170 views
AboutPostsPhotosVideos

Stream

 
The iPhone and iPad aren't 100% secure, but nothing is.
Apple has provided transparency into the security inner-workings of its iOS operating system. Learn if this makes the devices more enterprise-worthy.
1
Add a comment...
 
Are your iOS apps safe?
An iOS app vulnerability, present in many high-profile news apps, occurs due to a caching issue, according to the mobile security experts that discovered it.
1
Add a comment...
 
Ponemon report shows the cost enterprises pay to clean up after a cyberattack has increased 26% from 2012
The Ponemon Institute's fourth-annual report on the cost of cybercrime shows that sophisticated and frequent attacks are driving up attack resolution costs for enterprises in 2013.
1
Add a comment...
 
SureStart: An unconventional approach to safeguarding endpoint security.
HP has introduced a new security feature called SureStart that cryptographically verifies computers at boot time, rewriting the BIOS if it has been corrupted.
1
Add a comment...
 
Cigital CTO Gary McGraw distinguishes between cyberwar and cyberespionage.
In this video interview recorded at RSA Conference 2013, Cigital CTO Gary McGraw distinguishes between cyberwar and cyberespionage, two terms that are often used interchangeably.
1
Add a comment...
 
Peel back layers of network traffic with Security Onion
In this screencast, Keith Barker, CISSP and trainer for CBT Nuggets, provides a Security Onion tutorial, demonstrating how to analyze network traffic using Security Onion's tools.
1
Add a comment...
Have them in circles
79 people
SearchSAP.com's profile photo
Tessa Parmenter's profile photo
SearchCRM.com's profile photo
PrinterComparison's profile photo
Brighthand's profile photo
Mark Fontecchio's profile photo
Eric B. Parizo's profile photo
SearchCIO.com's profile photo
SearchVirtualDesktop.com's profile photo
 
RSA: "The advent of a freshly coded new Trojan malware application is not too common in the underground."
The new Pandemiya banking malware, which RSA researchers say has been coded from scratch, includes many top-of-the-line malware features.
1
Add a comment...
 
What does the preliminary version of NIST Cybersecurity Framework offer?
The preliminary version of the NIST Cybersecurity Framework offers general critical infrastructure security best practices, but few specifics. A 45-day comment period will end in December 2013.
1
Add a comment...
 
Learn how to plan for cloud application security prior to a cloud application migration.
Learn how to plan for cloud application security prior to a cloud application migration. Performing an application profiling exercise prior to migrating legacy apps to the cloud is essential.
1
Add a comment...
 
SureStart: An unconventional approach to safeguarding endpoint security.
HP has introduced a new security feature called SureStart that cryptographically verifies computers at boot time, rewriting the BIOS if it has been corrupted.
1
Add a comment...
 
Sandboxing: A key technology in advanced malware detection
Advanced malware detection products depend on sandboxing technology, even though it doesn't solve all security issues for enterprises. Expert Brad Casey discusses.
1
Add a comment...
 
Unlock new pathways to network security architecture in this month's Information Security magazine.
1
Add a comment...
Story
Tagline
Your resource for expert advice on data security in the financial services industry
Introduction
SearchFinancialSecurity.com is part of the TechTarget network of sites. This site offers expert advice and tips on data security and financial services topics, including data compliance best practices, emerging security threats and attacks, secure user authentication methods, corporate network security and more.