Showing 65 results for: Tips & Tricks ×

5 Steps for Financial Firms to Get Ahead of the Attackers

The U.S. treasury secretary recently warned financial services firms that they are not doing enough to stay ahead of today's cyber threats, a misfire that could result in a huge blow to the global economic system. Where are they lacking? We offer five things for banks and others to do now - before it's too late.

4 Ways to Ensure the Next Application You Roll Out is Security Ready

Did you know that four out of five IT professionals are pressured to roll out IT projects before they are security ready? In many cases, those projects are mobile, cloud and web applications that front some of an organization’s most sensitive data. From obtaining C-Level support to developer training to vulnerability testing, find out how to beat back the pressure and ensure your next application rollout has security in mind.

Two million stolen passwords: How to protect yourself

This week Trustwave security researchers uncovered a criminally controlled web server that contains nearly two million stolen account usernames and passwords for many popular sites, including Facebook, Twitter, LinkedIn, Google and Yahoo. Over the past few days, news outlets worldwide have reported on the discovery, and many people, including our customers, have questions about the malware, its impact and how they can protect themselves.

6 Tips to jumpstart your PCI DSS 3.0 compliance

The PCI Security Standards Council officially has released the 3.0 version of the PCI DSS standard. Businesses have plenty of time to begin assessing their data security practices against these updated and new rules, but for many, this will require some work.

8 things to know about PCI DSS 3.0

Version 3.0 of the Payment Card Industry Data Security Standard (PCI DSS) is due to be published on Nov. 7. That may send shivers down your spine, but the reality is, as technology advances and threats evolve, payment security requirements need tweaking.

How to Proactively Protect Web Applications

Web applications are critical to business operations these days - serving as an important revenue channel and as a significant customer touch point. But what we don't know is that they bring a level of unexpected exposure - becoming the preferred attack vector for hackers.

Protect Your Neck: You Can't Depend on a Mobile Device to Protect You or Your Mobile App

If I could ingrain one piece of security wisdom into the minds of mobile application development teams, it would be, “Don’t depend on the security of the device for which you’re developing.” An attacker can leverage too many variables to construct an attack and compromise a mobile device. And as much as they might like to, any one development team can’t control all of those variables.