Rethinking InfoSec in ‘Digital Business’ Era

Gartner Summit's Fresh Look at Security, Risk ManagementThe Gartner Security and Risk Management Summit tackles digital business, a concept that blurs the physical and digital worlds, and requires organizations to reconsider how... Read more »

How Banking Security Will Evolve

Financial services firms are increasingly applying contextual security tools to help identify fraud more quickly. But a shift to continuous authentication will provide even better security, says Vasco's Jan Valcke. Read more »

Inside An Elite APT Attack Group

How does an advanced threat adversary operate for 10 years, undetected? FireEye APAC CTO Bryce Boland shares details of the decade-long APT30 campaign that targeted organizations in India and Southeast Asia. Read more »

Busting the Beebone Botnet

Intel Security cybercrime expert Raj Samani says that after the April disruption of the Beebone botnet by law enforcement agencies, researchers have found more infected nodes than normal, largely in Iran. Read more »

Evaluating the Risk of ‘Digital Business’

Assessing the risks presented by "digital business" - the new business designs that blur the digital and physical worlds - will be a theme at the 2015 Gartner Security and Risk Management... Read more »

Infosec Europe: Visual Journal

Highlights from the London Show's 20th AnniversaryThis year's Infosecurity Europe conference in London - celebrating its 20th anniversary - decamped from Earl's Court to the glass-topped, 19th-century Olympia Conference Center, and featured... Read more »

Enterprise Security 3.0 for Banks

A 3-Step Strategy for Risk Mitigation in the New EraAs banking embraces emerging technologies, security leaders face increased cyber-risks. But they can leverage this three-step prevention, detection and response framework for simplified... Read more »

How Do We Catch Cybercrime Kingpins?

Police In Pursuit of Top 200 Online Attack EnablersLaw enforcement officials estimate that fewer than 200 people in the world build the core infrastructure and tools relied on by cybercriminals who would... Read more »

Life’s UX – How IoT is Changing the Identity and Access Management Game

In Chapter 9 of the O'Reilly ebook 'Designing for the Internet of Things,' Claire Rowland discusses the need for a cohesive user experience of a single application across such different devices: In systems... Read more »

How to Think Like a Hacker

Fidelis Strategist: Key to Defense is to Understand AttackersIn the face of advanced threats, security leaders must first understand their attackers' strategies and tactics. Jim Jaeger of Fidelis offers keen security insight... Read more »