Why Cryptography Is the New Gold for Banking and Blockchain

Blockchain and Cryptography: The New Gold Standard Over the past 200 years, the role of gold in international trade has been undeniable as a means to standardize prices across currencies and secure payments across borders. Before 1875, global financial systems based prices on the amount of gold held in coins, which could then be exchanged […]

The post Why Cryptography Is the New Gold for Banking and Blockchain appeared first on Security Intelligence.

Continue reading Why Cryptography Is the New Gold for Banking and Blockchain

Security in Banking: Are You Facing the Right Direction?

The financial industry’s increasing dependence on advanced technologies has two major implications. First, the financial companies that adopt these technologies are able to leverage new and improved services, solve legacy issues and introduce competitive differentiation as a result. Second, the increased complexity of these systems creates more potential weak spots for cybercriminals to exploit. It […]

The post Security in Banking: Are You Facing the Right Direction? appeared first on Security Intelligence.

Continue reading Security in Banking: Are You Facing the Right Direction?

Are Drone-Led Cyberattacks the Wave of the Future?

As technology evolves and becomes increasingly available to consumers and fraudsters, drone-led cyberattacks may become more common.

The post Are Drone-Led Cyberattacks the Wave of the Future? appeared first on Security Intelligence.

Continue reading Are Drone-Led Cyberattacks the Wave of the Future?

Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

The transportation industry is a large target for cybercriminals, and the only way to avoid damaging attacks is to be proactive about security.

The post Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation appeared first on Security Intelligence.

Continue reading Planes, Trains and Automobiles (and More): No Shortage of Attack Targets in Transportation

Retail IT Professionals Feel More Prepared for Data Breaches

A recent survey showed that retail IT professionals feel they are prepared for data breaches, though other data doesn’t fully support their belief.

The post Retail IT Professionals Feel More Prepared for Data Breaches appeared first on Security Intelligence.

Continue reading Retail IT Professionals Feel More Prepared for Data Breaches

Insider Threats, Industrial Sabotage and Game Theory

Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.

The post Insider Threats, Industrial Sabotage and Game Theory appeared first on Security Intelligence.

Continue reading Insider Threats, Industrial Sabotage and Game Theory

IoT Security and the Automotive Industry: Highway Heaven or Driver Hell?

It’s clear from both IoT advocates and skeptics alike that security is the key to the continued technological maturity of the automotive industry.

The post IoT Security and the Automotive Industry: Highway Heaven or Driver Hell? appeared first on Security Intelligence.

Continue reading IoT Security and the Automotive Industry: Highway Heaven or Driver Hell?

Lessons Learned From a Master Inventor: An Interview with IBM’s Lisa Seacat DeLuca

Here are four lessons to take from the advice of Lisa Seacat DeLuca, a master inventor and omnichannel strategist for IBM Commerce.

The post Lessons Learned From a Master Inventor: An Interview with IBM’s Lisa Seacat DeLuca appeared first on Security Intelligence.

Continue reading Lessons Learned From a Master Inventor: An Interview with IBM’s Lisa Seacat DeLuca

The InfoSecond, Week of March 21: X-Force Report, Thingbots and More!

Bracket busted? Don’t worry, we’ve got a brand new episode of The InfoSecond to take your mind off of your team’s crushing loss.

The post The InfoSecond, Week of March 21: X-Force Report, Thingbots and More! appeared first on Security Intelligence.

Continue reading The InfoSecond, Week of March 21: X-Force Report, Thingbots and More!

Breaking Borders: Is HIPAA History in a Post-EHR World?

The rash of cyberattacks on health care organizations has highlighted the need for the industry to move beyond HIPAA to develop stronger security strategies.

The post Breaking Borders: Is HIPAA History in a Post-EHR World? appeared first on Security Intelligence.

Continue reading Breaking Borders: Is HIPAA History in a Post-EHR World?