For the past decade, governments around the world have established international anti-money laundering (AML) and counter-terrorist financing efforts in an effort to shut down the cross-border flow of funds to criminal and terrorist organizations. Their success has encouraged criminals to move their cash smuggling away from the financial system to the byzantine world of global trade. According to PwC US, big data analytics are becoming essential to tracking these activities.
Thor Olavsrud |
21 Jan |
Read more
Information security experts today praised the attention U.S. President Barack Obama is lavishing on cybersecurity, but have some concerns about how proposed legislation will be implemented and enforced while others say the proposals don't go far enough.
Thor Olavsrud |
14 Jan |
Read more
In information security circles, 2014 has been a year of what seems like a never-ending stream of cyberthreats and data breaches, affecting retailers, banks, gaming networks, governments and more.
Thor Olavsrud |
11 Dec |
Read more
Despite the massive scale of the theft of Personal Identifiable Information (PII) and credit card and debit card data resulting from last year's data breach of retail titan Target, the company's PCI compliance program may have significantly reduced the scope of the damage, according to new research by security firm Aorato, which specializes in Active Directory monitoring and protection.
Thor Olavsrud |
02 Sep |
Read more
Are you sick of usernames and passwords as a method of user authentication? Verizon says it has a better way. It's beefing up its Universal Identity Services portfolio with a QR code login that enterprises can deploy to streamline logins for both internal and external users.
Thor Olavsrud |
27 Aug |
Read more
Last month, the White House released its 90-day review of big data and privacy, renewing the call for a Consumer Privacy Bill of Rights along with a number of other policy recommendations.
Thor Olavsrud |
03 Jun |
Read more
With black hat hackers now outgunning legitimate organizations, the world's largest security company is adopting a new integrated approach to advanced threat protection.
Thor Olavsrud |
05 May |
Read more
Enterprise workloads are shifting to Cloud and hosting environments in ever greater numbers and attacks that have historically targeted on-premises environments are following them, according to a new report.
Thor Olavsrud |
24 Apr |
Read more
Employees who use software-as-a-service (SaaS) applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behaviour and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.
Thor Olavsrud |
25 Feb |
Read more
Most business units these days are leveraging cloud services, and a majority of them are bypassing IT to do it, according to a new study. While many IT departments want to take charge of provisioning cloud services, it may make more sense to get your arms around compliance and governance first.
Thor Olavsrud |
16 Jan |
Read more
Senior management at small and mid-size businesses (SMBs) are failing to take cyber security seriously and are putting their organizations at risk, according to a recently released study by security research firm Ponemon Institute.
Thor Olavsrud |
26 Nov |
Read more
Executives at midsized industrial firms believe their data is at little or no risk, even though they hold valuable intellectual property and business process data sought by criminals, according to consulting firm McGladrey.
Thor Olavsrud |
26 Aug |
Read more
Managing devices in a BYOD environment is no small feat, and the right mobile device management product is a key component in making it work. Here are 10 top MDM vendors in the market today.
Thor Olavsrud |
03 Jul |
Read more
When it comes to data breaches, hackers and organized crime garner most of the headlines, but most data breaches are caused by human errors and system glitches--application failures, inadvertent data dumps, logic errors in data transfer and more. As a result, educating your employees and making sure they're not cutting corners is a big component in preventing data breaches.
Thor Olavsrud |
17 Jun |
Read more
For the second year in a row, social media sites (including gaming and dating sites) are leading the way in consumer security and privacy protections, beating out Internet retailers and banks, according to an annual comprehensive audit by the Online Trust Alliance (OTA).
Thor Olavsrud |
10 Jun |
Read more