Learn about the challenges involved in combating first-party fraud and emerging best practices
bae systems, applied intelligence, fraud, first-party fraud, financial institution, network analytics, detection, prevention, netreveal, unsecured credit, direct deposit account, application fraud, sleeper fraud, cash-cycling, fraudster, cyber security, financial crime, intellectual property, information technology
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
How to secure your network without busting your IT budget
bae systems, applied intelligence, fortune 500, business security, network security, it management, security products, security systems, log data, detects threats, protects network, it budget, software-as-a-service, saas, log management, security, cloud computing, regulatory compliance, security expertise, cyber security
Detect and monitor for cyber attacks
bae systems, applied intelligence, cyber security, targeted attacks, network security, security technology, tap, targeted attack prevention, targeted attack protection, cyber attack, data breach, phishing, zero day prevention, zero day exploits, spear phishing, longline phishing, hacking, malware, advanced threat, security strategy
This framework will help you decide which MSSP best meets the needs of your financial institution
bae systems, applied intelligence, financial institution, managed security, managed security services, managed security service provider, mssp, data breach, network security, monitor, outsource, cloud, it management, security technology, compliance, analyst, information security, managed security platform, ffiec, third party audit
For most financial institutions, it’s no longer a question of ‘if’ but ‘when’ they’ll be attacked..
If you’re like most financial institutions, you have controls that identify breaches, but need proper procedures that’ll enable you to recover from such an event. In this presentation at the CUNA Technology Council Conference, Tom Neclerio, BAE Systems’ VP of Cyber Consulting Services, discusses the current threats across the financial marketplace and explores strategies for implementing a successful incident response program as outlined in the FFIEC’s cyber resilience guidance.
bae systems, applied intelligence, cyber security, cyber resilience, incident response, financial institution, data breach, cyber attack, ffiec, compliance, regulations, security challenges, regulatory compliance, cyber professional services, risk assessment, vulnerability, penetration testing, crimeware, phishing, critical infrastructure
Published Date: Jun 12, 2007
This white paper describes how Bayesian mathematics can be applied to the spam problem, resulting in an adaptive, 'statistical intelligence' technique that achieves very high spam detection rates.
anti spam, anti-spam, filter, block, blocking, email security, phishing, baysian, bayesian, spam detection, gfi
Threat intellegence can even up the battle between attackers and defenders. This 31 page report from Securosis defines Threat Intellegence and discusses how you can leverage threat intelligence to shorten the window between compromise and detection.
advanced malware, targeted malware, layered malware defense, targeted attacks, critical infrastructure threats, forensic analysis, static detection, dynamic detection, forensic analysis, application control, vulnerability scanning, real-time kernel protection