In this report we provide a broad view of the threat landscape, ranging from industry-wide data down to a focused look at different technologies, including open source, mobile, and the Internet of Things. The goal of this Report is to provide security information leading to a better understanding of the threat landscape, and to provide resources that can aid in minimizing security risk.
In the age of all things digital, almost every single person has left a footprint on the World Wide Web. We post and share information at the touch of a button, without much thought about where that information may go. With so much data being transmitted on a daily basis, there are those who use the relative anonymity of the internet to maliciously steal valuable and private information. Because of these faceless criminals who lurk in the shadows of the cyber underworld, cyber security has never
been more important than it is now.
Jason Harrell, Corporate Senior Information Risk Officer, Bank of New York Mellon discusses the threats to security in the financial Services from whole identity theft, credit card fraud, healthcare fraud, tax fraud and much more.
Let’s face it – someone out there wants your sensitive data. Smishing. Spear Phishing. Clickjacking. We are bombarded everyday with headlines shouting the new and inventive ways attackers are coming after our sensitive information and the catastrophic consequences when they actually get their hands on it. By now, security education should be a top priority for any organization with information to protect, which is EVERY organization. Technology is a credible line of defense, but it cannot be the only one.
Lisa Parcella, Director of Product Management at Security Innovation shares ways to create a successful security education program, while avoiding common mistakes during implementation.
Often with security and privacy concerns there exist trade-offs with usability and complexity. The most secure user is often the one who doesn’t use the Internet, but if you would like to climb out from under your rock to join the rest of us on the Internet, this guide is here to help you. Getting to a point where you can be reasonably confident in your personal security and privacy online can take a lot of effort, due diligence, and technical vigilance.
In this guide, Geoffrey Vaughan of Security Innovation detail best practices to improve your overall personal security and privacy.
Organizations of all sizes face serious challenges with online payment card security. Technical environments frequently change, best practices continually evolve, and industry standards are regularly updated - all while hackers and other criminals diligently develop new ways to cause trouble. Thus, security awareness training programs have become a much higher, more accelerated priority for risk-sensitive employers.
Security Innovation commissioned a research study from Ponemon Institute to better understand the extent that organizations are educating employees about information security standards.