This Blog has Moved!

This blog is moving to


Thank you for visiting! Content will remain here for archival purposes.

Space Weather Outlook November 23, 2014 at 10:55PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-47 2014 November 23 at 8:42 p.m. MST (2014 November 24 0342 UTC) **** SPACE WEATHER OUTLOOK **** Summary For November 17-23 No significant space weather was observed during the summary period. Outlook For November 24-30 R1-R2 (minor-moderate) radio blackouts are possible through the outlook period due to the size and complexity of Regions 2209 and 2216. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

When Worlds Collide: Cloud Apps and Financial Services

The following is external content provided as a free resource for blog readers.





Trends suggest that cloud services will soon be the new norm for financial institutions. However, there are two major hurdles to clear when moving financial data out of an on-premises network to public cloud applications: security and compliance regulations. This white paper discusses cloud access security brokers and how they can help the finance industry stay secure in the cloud as well as be compliant.



Request Free!

Isn't The Cloud Already Secure?

The following is external content provided as a free resource for blog readers.





Successful innovations invariably reach a transitional point at which the general population stops viewing them as shiny toys and realizes these advances are valuable assets. Eventually, like email, it becomes a tool that society can't live without.



The adoption of the cloud, however, hasn't been as rapid as experts predicted. Find out who's really responsible for these cloud apps, and the benefits of having a vendor that can protect your corporate data.



Request Free!

Why Some Things Shouldn't Go Viral

The following is external content provided as a free resource for blog readers.





Email is the most used application in any modern enterprise, yet it remains the primary avenue for sensitive corporate data to leave your network. Securing email becomes even more challenging when BYOD is introduced.



Employees love using a single mobile device for work and life. On the surface, this makes a lot of sense – not only is the employee already familiar with the device, but BYOD can also help cut costs.



The problem? The fact that employees are using their own devices, running a variety of operating systems, and connecting over insecure Wi-Fi networks makes data security difficult to achieve.



Request Free!

Top Six Things to Consider with an Identity as a Service Solution

The following is external content provided as a free resource for blog readers.





IT doesn't like it either. After all, they're just trying to ensure the security of your enterprise but they're often burdened with password retrieval activities when they could be focused on more value-added tasks. Because your employees have work to do, and they're suffering from password fatigue, they resort to using passwords that circumvent security practices—inviting hackers into your enterprise data. Solutions to solve the problem are often cumbersome making a complicated problem…well, more complicated.



Is there a better way?



Absolutely: unified identity management with an Identity as a service Solution (IDaaS).



Download the white paper: Top Six Things to Consider with an Identity as a Service Solution. You'll discover how an IDaaS can help you drive user productivity, enhance IT efficiency, improve security, mitigate risk, and lower total cost of ownership.



Request Free!

What are the top 10 emerging threats in telecoms?

The following is external content provided as a free resource for blog readers.






With operators reported to be losing between 3-9% of their annual revenues to fraud, the proactive detection and efficient management of fraud and RA threats are on-going, complex business priorities that are integral to staying ahead of the fraudster. So, what can operators do to stay ahead of the game and prevent revenue losses? Read on and find out...






Request Free!

Space Weather Outlook November 16, 2014 at 09:31PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-46 2014 November 16 at 7:19 p.m. MST (2014 November 17 0219 UTC) **** SPACE WEATHER OUTLOOK **** Summary For November 10-16 Radio blackouts reaching R1 (minor) were observed on 15 November while R2 (moderate) was reached on 16 November. The source of this activity was from active Region 2209. Outlook For November 17-23 Radio blackouts reaching R1-R2 (minor-moderate) are likely through the outlook period. Region 2209 will be the likely source for any significant solar activity. Geomagnetic storms reaching G1 (minor) is expected on 17 November due to effects from a geoeffective coronal hole high speed stream. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Next Generation Criminal Fraud Detection

The following is external content provided as a free resource for blog readers.





As fraud rises, there is a strong need for fraud tools that can detect account takeover and fraudulent transactions. IBM® Security Trusteer™ Pinpoint Criminal Detection software offers a next generation approach that helps address the challenges of traditional risk engines.



Trusteer Pinpoint Criminal Detection helps you to:

  • Detect Fraud with evidence-based indicators - Correlates device and account factors for account takeover detection

  • Reduce Operational Impact - Free up valuable resources, rather than focusing on investigating each fraud indicator, such as alerts, by only being alerted to truly high risk access and requests

  • Improve your customer's experience

  • Help remove unnecessary user challenges, the lowering friction with customers






Request Free!

Three Steps to Prevent Workplace Crime

The following is external content provided as a free resource for blog readers.





You know security is a priority – but where do you start? If you're not a security professional, initiating where to first spend your time and money can be the hardest part. In order to get you started, we've consulted the experts. From understanding what you need in a security review to gaining the power to control your entries to simply understanding the general mind of an opportunistic criminal, you can make a big difference in your company's security.



Request Free!

How to Overcome the Top 5 Business Vulnerabilities

The following is external content provided as a free resource for blog readers.





Establishing a thriving business takes dedication and hard work. But all too often, business owners and managers find themselves too busy working to protect what they've worked so hard for to make time to put in place preventative measures as well. To make sure that more businesses are aware of the risks, Tyco IS listed the top five vulnerabilities business owners face every day. From burglary to vandalism to liability, see how you can tackle the risks with the right strategies.



Request Free!

The Case for Mobile Security Management

The following is external content provided as a free resource for blog readers.





Since embezzlement and internal theft are leading causes of mid-sized business failure, making sure your company is secure on the inside isn't paranoia – it's smart business. Learn how you can implement simpler security measures with the convenience of your smartphone or tablet. Like never before, you can maximize your most precious non-renewable resource: your time. Give yourself one less thing to worry about and learn how to safeguard your business with your fingertips.



Request Free!

Mobility on Hold: Get Back on Track with Mobile Risk Mitigation

The following is external content provided as a free resource for blog readers.





Fortunately, new security measures are available to mitigate the risks associated with advanced mobile banking and payment capabilities. The key to protecting the mobile channel is to realize that it is deeply connected to the online channel. Effective protection must consider risk indicators that span both channels and extend to both to protect against the full range of attack vectors.



Read this white paper to learn about:

  • The mobile threat landscape and the latest techniques used by cybercriminals

  • The importance of a mobile risk engine that ingests device and account risk factors for the online and mobile channels to perform a real-time mobile risk assessment

  • How comprehensive mobile risk assessment is required by the FFIEC Guidance






Request Free!

Winning the War on Cybercrime: The Four Keys to Holistic Fraud Prevention

The following is external content provided as a free resource for blog readers.





They then conduct real-time credential theft and take over accounts. The main reason for cybercriminals' continued success is that highly evasive advanced financial malware allows for a wide variety of attacks that are very difficult to detect with traditional fraud prevention technologies.



Download our latest white paper to learn:

  • How real-time intelligence is necessary to conclusively detect and prevent attacks

  • The importance of adapting to changes in fraud attacks without significant bank involvement or end user disruptions

  • The benefits of a transparent system that does not burden customers with complex authentication protocols or long delays

  • Why only a comprehensive fraud prevention platform can truly protect an organization from fraud attempts






Request Free!

The Thriving Malware Industry: Cybercrime Made Easy

The following is external content provided as a free resource for blog readers.





In today's virtual world, the scope of organizations vulnerable to malware-driven cybercrime is quite broad. In addition to banks and credit unions that are subject to online banking fraud, financial fraud can be perpetrated on insurance companies, payment services, large e-commerce companies, airlines and many others.



Request Free!

Selecting the Right Cybercrime-Prevention Solution

The following is external content provided as a free resource for blog readers.





Malicious software, or malware, is the primary attack tool used by cybercriminals to execute account takeover attacks, steal credentials and personal information, and initiate fraudulent transactions. The attack tactics, or crime logic, are constantly becoming more sophisticated so they can continue to exploit human and system weaknesses. Fraud-, risk- and IT-security professionals are looking to establish an effective defense against these attacks.



Request Free!

Meeting FFIEC Guidance and Cutting Costs with Automated Fraud Prevention

The following is external content provided as a free resource for blog readers.





Unmistakably, what led to the release of the FFIEC supplement was the introduction of advanced malware that has created an increasingly hostile online banking environment. Sophisticated malware has become the primary attack tool used by online banking fraudsters to execute account takeover, steal credentials and personal information, and initiate fraudulent transactions. To address emerging threats, the FFIEC requires organizations to continuously perform risk assessments as new information becomes available, adjust control mechanisms as appropriate in response to these changing threats and implement a layered approach to security. Consequently, financial organizations need to select solutions that are able to identify emerging threats, address their impact and apply layered security that can quickly adapt to the ever-changing threat landscape.



Request Free!

Holistic Fraud Prevention: Transforming the Customer's Experience

The following is external content provided as a free resource for blog readers.





When evaluating and implementing fraud prevention technologies, most security professionals focus on only the fraud avoidance capabilities. They often overlook the potentially significant adverse impact on customers' experience and operational costs. Good fraud prevention solutions must be effective at identifying and preventing fraud and must do so with no negative impact. Although many fraud prevention professionals believe there must be a tradeoff between strong security on one side and customer experience and operational costs on the other, this is simply no longer the case. Strong, effective security can and should both enhance customers' experience and lower operational costs.



Read this white paper to learn:

  • What is the state of today's cyber threat landscape

  • Why current platforms for fraud management fall short, hurting customers in the process

  • How Trusteer's Cybercrime Prevention Architechure provides a new paradigm for fraud prevention






Request Free!

Old Techniques, New Channel: Mobile Malware Adapting PC Threat Techniques

The following is external content provided as a free resource for blog readers.





Read this white paper to learn more about the emerging attack techniques used by cybercriminals in the mobile channel, including:

  • How the mobile threat landscape is evolving, including the traditional PC techniques now being used by cybercriminals in the mobile channel

  • How cybercriminals coordinate attacks across the online and mobile channels to perform Account TakeOver (ATO) fraud

  • What unique challenges are involved with protecting the mobile channel

  • How the IBM® Security Trusteer family of mobile security solutions can protect against mobile and cross-channel fraud






Request Free!

Ten Risky Security Behaviors to Avoid: Protect Your Organization

The following is external content provided as a free resource for blog readers.





You are a problem. You are a risk to your employer. The actions you take and the activities you perform at work, online, and even in your personal life put your employer at risk. You need to know how you are a security risk to the organization and what you can do to reduce or eliminate those risks. In this paper, I discuss ten common risky behaviors that typical workers engage in and what you can do to avoid being the weakest link in your company.



Request Free!

Space Weather Outlook November 09, 2014 at 10:23PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-45 2014 November 9 at 8:11 p.m. MST (2014 November 10 0311 UTC) **** SPACE WEATHER OUTLOOK **** Summary For November 3-9 Radio blackouts reaching the R1 (minor) level were observed on 03 - 06 November and again on 09 November. R2 (moderate) radio blackouts were observed on 03, 04 and 06 November while R3 (strong) radio blackouts were observed on 07 November. This activity was a result of significant flare activity from Region 2205. Outlook For November 10-16 The outlook calls for additional radio blackouts ranging from R1 - R3 (minor to strong) as significant flare activity is expected to persist from Region 2205 and the return of old Region 2192. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.

Data Center in the Crosshairs: Today's Most Dangerous Security Threats

The following is external content provided as a free resource for blog readers.





Comprising the most valuable assets in your organization – your web, DNS, database, and email servers - data centers have become the number one target of cyber criminals, hacktivists and state-sponsored attackers. This paper analyzes the top five most dangerous threats to your data center. It also describes the impact of these threats and it reveals the latest methods, tools and techniques used by attackers to exploit data center resources.



Request Free!

DDoS Report: The Escalating Threat of DDoS Attacks

The following is external content provided as a free resource for blog readers.





Virtually every commercial and governmental organization today is largely - if not entirely - reliant on its online services, and service availability is completely at risk from the rising tide of DDoS attacks. If you are concerned about the possibility of major service outages due to DDoS attacks, you should ensure that your vendor can scale to mitigate the largest multi-vector attacks at your network's edge.



Request Free!

Avoid Microsoft Lync Deployment Pitfalls with A10 Thunder ADC

The following is external content provided as a free resource for blog readers.





If Lync customers deploy multiple Lync servers or a "pool," they need to distribute traffic loads to those servers. Load balancing is not just a best practice, it's a requirement. Microsoft advises customers to provision either hardware load balancing or DNS load balancing. If load balancing is required, IT managers can deploy Thunder Series Application Delivery Controllers (ADCs) from A10 Networks to ensure world-class performance, applications availability, and resiliency for Microsoft Lync.



Security threats challenge enterprise networks at every level, and Lync applications are not immune. Distributed Denial-of-Service (DDoS) attacks are a particular danger for Lync installments. Thunder ADC acts as a reverse proxy between clients and Lync front-end servers, ensuring that all connections to servers are initiated from Thunder ADC. In this process, Thunder ADC eliminates potentially crippling DDoS attacks and other network-level threats.



Request Free!

Defending Against Network Based DDoS Attacks

The following is external content provided as a free resource for blog readers.





In this video we turn our attention to the network side of the house.



Request Free!

Space Weather Outlook November 02, 2014 at 10:29PM

Official Space Weather Advisory issued by NOAA Space Weather Prediction Center Boulder, Colorado, USA SPACE WEATHER ADVISORY OUTLOOK #14-44 2014 November 2 at 8:17 p.m. MST (2014 November 3 0317 UTC) **** SPACE WEATHER OUTLOOK **** Summary For October 27-November 2 Radio blackouts reaching the R1 (minor) level were observed on 27-30 October. Radio blackouts reaching the R2 (moderate) level were observed on 27-28 October while R3 (strong) levels were observed on 27 October. This activity all originated from large, complex sunspot Region 2192. Outlook For November 3-9 Radio blackouts reaching the R1-R2 (minor-moderate) level are possible through the outlook period. Data used to provide space weather services are contributed by NOAA, USAF, NASA, NSF, USGS, the International Space Environment Services and other observatories, universities, and institutions. More information is available at SWPC's Web site http://swpc.noaa.gov Thank you for using the Product Subscription Service. If you would like to remove a product subscription or update the personal information in your account, go to the Product Subscription Site. Please do not use the from address for correspondence, as it is not monitored. For comments or help, please contact SWPC Help.