main

Security

Cybersecurity & The Customer Experience: The Perfect Combination

May 22, 2018 — by Anna Convery-Pelletier1

finance-data-protection-960x640.jpg

Organizations have long embraced the customer experience and declared it a competitive differentiator. Many executives are quick to focus on the benefits of a loyal-centric strategy and companies now go to great lengths to communicate their organization’s customer centricity to retain existing customers and attract new ones.

But where is cybersecurity in this discussion?

SecuritySSL

Cyber and Securities – Financial Institutions Attack Landscape

August 16, 2017 — by Ben Zilberman0

financial-services-960x655.jpg

Recently Italian bank Unicredit suffered two security breaches. Data of 400,000 customers was stolen, including loan account numbers and Personally Identifiable Information (PII). There is a suspicion the breach had to do with interaction with a 3rd party. This incident is the latest reported in a long history of cyber-attacks against financial institutions. Every hack however, can teach us a lesson.

DDoS AttacksSecurity

Security Week Article: The Missing Layer Against Encrypted Attacks

December 5, 2012 — by Avi Chesla1

I recently contributed another column to Security Week about attackers launching attacks over HTTPS more than ever before. With an increased level of encrypted traffic on enterprise networks, attackers are taking advantage of this blind spot within the organization’s security model.

Social Media services and online financial services have become targets. Most will employ different layers of defense for an encrypted attack. However, this approach will not be effective if an attack included an availability-based threat vector such as Denial of Service attack or zero-day advanced threats.

This is because processing an encrypted attack consumes more system resources than processing non-encrypted data. As a result, an attacker is able to make a big impact even at relatively low rates of requests per second. The solutions that can decrypt the traffic can only detect the known low rate attacks rather than the unknowns (zero-day).

To really help mitigate an attack such as this, a network needs to include another layer which is the network wide attack protection.

I share my thoughts on what an organization needs in order to successfully handle these threats and invite you to read this column to learn more about it. You can also tweet about the column to share it with your followers.