Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
Recent data breaches have drawn attention to the cybersecurity field, and millennials have taken notice. A new survey shows an increasing interest in the career path among young adults but also a lack of knowledge about the field.
As high-profile data breaches continue to grab headlines, demand is growing for well-trained digital forensics experts who can conduct timely investigations to determine the cause of a security incident and help identify mitigation steps.
European financial services firms and law enforcement agencies have been stepping up their efforts to trade actionable intelligence and better defend themselves against emerging malware and fraud campaigns.
Fraudsters continue to make inroads against financial institutions based in the United Kingdom - and beyond - because banks aren't working together to share information about the attacks they see, according to presenters at the London Fraud Summit.
If the U.S. military awarded a decoration for hacking, Army Col. Gregory Conti would wear it proudly on his uniform. Hear Conti, director of the Army Cyber Institute, explain why ethical hacking helps drive America's innovation engine.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.
Initial reports suggested that Russian hackers could behind an attack against JPMorgan Chase, and perhaps other U.S. banks. While it's still far from clear who the culprits are, experts discuss the potential hacking motivations of a nation-state.
The IAPP has launched a new privacy certification designed for IT, security and engineering pros. What are the key elements of this new program? JC Cannon, a privacy author and educator, shares details.