During the 4th quarter of 2014, a record number of crimeware variants were detected, all designed to defeat antivirus software, according to a report from the Anti-Phishing Working Group. Meanwhile, phishers increasingly targeted retail and service sites, hoping to take advantage of the burgeoning numbers of online shoppers.
Despite organizations' best efforts to secure intellectual property and other sensitive information, limited progress has been made in effectively managing information risk in the supply chain.
An annual survey of encryption deployment in businesses finds that slightly more firms have a comprehensive strategy than last year, with retail and health care firms showing the most significant gains.
The relationship between the chief information officer and chief security officer (or chief information security officer) can be fraught with tension - and that can be a good thing. Both executives play a critical role in your organization's C-suite, and better understanding these sometimes overlapping roles can only make your business stronger and more secure.
If the past 12 months saw a dramatic increase in data breach activity, then the year ahead promises to bring an entirely new set of concerns - and a shift in how companies are responding to the cyber threat.
A cyber crime occurs every 18 seconds, but few companies are developing proactive plans to deal with a security event before it happens. Involving executives, including a company's board of directors, is imperative for retailers to mitigate the damage from a breach.
Chief financial officers of corporations that have already set up captive insurance companies or are thinking about setting one up should ponder the benefits of self-insuring cyber perils and supply chain business-interruption risks via a captive to supplement commercial insurance coverage.
Siemens Industry Sector is partnering with McAfee, a division of Intel Security, to provide security and protection against global cyber threats for industrial customers.
Corporate criminals are using professional and systematic methods to target the weakest link for global organizations, the supply chain. High profile exploits such as Target's supply chain disaster are raising concerns across numerous verticals on business stability. With the threat of tainted and counterfeit technology products building every day, organizations must come together now and take what steps they can to mitigate risks to the supply chain.
While the mobile channel grows in importance and revenue for merchants, so does their fear of fraudulent attacks and the realization that combating that risk requires specialized tools. Those are some of the key findings from the Second Annual Mobile Payments and Fraud Survey, available for free download at the Kount Inc. website.