NSS Labs announced the results of its Next Generation Firewall (NGFW) Group Test. Eleven products from 10 market-leading vendors were tested in the key areas of security effectiveness and total cost of ownership (TCO). Of the NGFW vendors whose products had results published today, seven products received a Recommended rating, while four products received a Caution rating.
HPE unveiled its 10th-generation ProLiant servers, which it called the "world's most secure industry standard servers." According to a press release, HPE utilizes silicon-based security in its platforms, as a means of addressing firmware issues. The servers will work in tandem with other updates as part of HPE's Synergy composable infrastructure.
iStorage announced the launch of their new range of USB 3.1 Hard Disk Drives (HDD) and Solid State Drives (SSD), consisting of the diskAshur², diskAshur² SSD, diskAshur PRO², diskAshur PRO² SSD and the diskAshur DT². The new drives feature Enhanced Dual Generating Encryption (EDGE) technology.
Radware announced the new Alteon D-line of appliances and software which are designed to address evolving market challenges around the increase in encrypted traffic, the increase in encrypted attacks and malware, and the growing needs for data center automation. Radware Alteon D-line is available with a range of add-on software modules and subscriptions that extend the capabilities of the application delivery controller (ADC).
The Electronic Frontier Foundation notes that "it is probably safest to assume that all modern color laser printers do include some form of tracking information that associates documents with the printer's serial number."
Organizations that run more than half of their computers on outdated operating systems are three times more likely to suffer a data breach, while those running more than half of their browsers on old versions are twice as likely to get hit with a breach, a new study found.
Ransomware is one of the most prominent cybersecurity threats in the enterprise, but it doesn't work against Windows 10 S, Microsoft said. According to a recent blog post by Robert Lefferts, director of program management for Windows Enterprise and Security, "no known ransomware works against Windows 10 S," which Lefferts also called Microsoft's "most hardened operating system."
This article covers complimentary tools and apps that can help you better use Windows -- whether it's the latest version, Windows 10, or earlier iterations still in use.
The Federal Financial Institutions Examination Council (FFIEC), on behalf of its members, just released an update to the Cybersecurity Assessment Tool (Assessment). This update to the Assessment addresses changes to the FFIEC IT Examination Handbook by providing a revised mapping in Appendix A to the updated Information Security and Management booklets. The updated Assessment will also provide additional response options, allowing financial institution management to include supplementary or complementary behaviors, practices and processes that represent current practices of the institution in supporting its cybersecurity activity assessment.
ATM jackpotting malware makes for big headlines, but it's garden variety ATM skimming that makes up the bulk of ATM attacks — and financial losses — worldwide. Many deployers are reluctant to try antiskimming solutions because they believe they'll have to choose between maximum uptime and maximum security, and that it's just wishful thinking to expect they could have both.
A snag in plans to open an automated bank branch in downtown Minneapolis is providing insight into issues FIs might encounter as they seek to transform their business model in a world that's still catching up with 21st century fintech.
A new Fiserv report entitled "2017 Expectations & Experiences: Consumer Payments" shows substantial growth in mobile bill pay offerings and usage over the past year. Almost one in five visits to a biller’s website come from a mobile device which equals a 55% increase over 2013.
Early predictions held that millennial men would be first to adopt mobile wallets. However two new research studies are casting doubt on the assumptions about the roles gender and age are playing in the mobile payments adoption.
Apple just unveiled a new peer-to-peer payments system for its Apple Pay service, putting it in competition with PayPal-owned Venmo. With the new payment capability, which Apple says will be launching as an iMessage app, users will be able to send and receive money right within a text conversation. Apple device owners will have the option to authenticate their transaction through Touch ID.
The company announced the general availability of its AI-based platform and reveals details of powerful outcomes achieved by design partners and early customers. The Silicon Valley-based company claims that they have built the security industry's first predictive breach-risk platform.
Centrify will award up to $3,000 per vulnerability to ensure the security of the Centrify Identity Services platform. The public program will leverage more than 50,000 security researchers on the Bugcrowd platform to help reinforce the security of the Centrify Identity Services platform.
Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a recent snapshot poll at Infosec Europe. More than a third (35%) cite distraction and boredom as the main cause of human error, while other causes include heavy workloads (19%), excessive policies and compliance regulations (5%), social media (5%) and password sharing (4%).
To help provide security personnel with the visibility, context and automation required to investigate and resolve threats lurking on endpoints and to protect their organizations from cyberattacks, Fidelis Cybersecurity announced the availability of Fidelis Endpoint Cloud.
If you want to meet a really smart hacker, talk to a cybersecurity defender. These talented professionals are working every day to make cybercrime harder and less lucrative.
From fake dollars and pounds, to false pesos and euros and bogus rupees and yuan, the threat of counterfeit currency spans the globe. Advances in scanning and printing technology have made it easier than ever for counterfeiters to stay in business.
Battling Security Fatigue – Working Towards Usable Security
Network Box - https://www.networkboxusa.com
Read Pierluigi Stella's comments:
Credit card rewards have become increasingly lucrative, as credit card issuers battle for consumers. From 100,000 point sign-on bonuses to 6% cash back offers, it has never been a better time to be a credit card user.
The e-commerce giant has (arguably) the most sophisticated ML toolset around that is uses for drone deliveries, online tailors, and its AWS offering. Turns out, Amazon’s lesser known operation – small business lending – is also powered by machine learning, Bank Innovation has learned.
Western Union is trialing an integration with digital currency exchange Coinbase, in which Western Union will appear within the web app of the exchange.
One basic feature missing from most online and mobile banking services is the ability to edit/annotate transactions. Some FIs support transaction and/or category editing in their PFM modules. But it’s very rare to see it within basic digital banking.
RBR’s new report entitled "Teller Automation and Branch Transformation 2017" shows that FIs in a number of countries are turning to terminals offering remote video transactions as part of their branch transformation strategies.
ING released the results of its latest international survey finding that while people are using their smartphones and tablets to perform banking tasks, they aren’t comfortable with giving up control of their finances to their computers.
SD-WAN traffic is the fastest-growing segment of the overall enterprise WAN market, increasing at a 44% compound annual growth rate, while traditional WAN will grow at only a 5% rate. The healthy growth rate of SD-WAN is a partial vindication of the network virtualization trend. Virtual customer premise equipment (vCPE), a common element of SD-WAN, was expected to be one of the least difficult instances of virtual technology to deploy. Though it wasn’t the slam dunk everyone expected it to be, it was - to extend the metaphor - a relatively easy layup.
As new technologies like software defined networking, cloud computing and the Internet of Things continue to grow in maturity and adoption, organizations are faced with transforming their networks to keep up with the changes.
Eight out of ten of consumers will consider switching to a competitor due to poor service. With the hype of artificial intelligence (AI) and other emerging technologies that help make organizations more efficient, it can be easy to lose sight of what really matters: delivering a great customer experience at every opportunity.