The theme for DDoS attacks in the first half of 2014 was volume, volume, volume. For the first time ever, our ATLAS® data shows an unparalleled 100+ attacks over 100 GB/sec. And the number of attacks in the 20 GB/sec range is already twice that of what ATLAS monitored in all of 2013.
Your CSO/CiSO understands the need for a security solution to address a threat facing your organization, but does your CFO? Your CFO is really thirsty to understand that financial benefit of a project, but may not understand the financial reasons why they should invest in a security project. If your security project does not provide a Return on Investment (ROI), then how can you financially justify your project? This is a common question faced by security professionals, who can measure the impact of a security incident, but is challenged when asked to justify the benefit of solutions designed to prevent losses.
Sometimes marketing folks (like me) take liberties in showcasing extreme scenarios or statistics.
Mobile networks have evolved by leaps and bounds in the past handful of years, particularly as mobile users continue to gobble up as much mobile network capacity as possible. Mobile data usage is ubiquitous today with the advent of always-on connectivity, the pull to constantly ‘check in’ on various social networks and applications, and to be able to access the mobile network at any time, at lightning fast speeds and with zero downtime. This trend is expected to continue as successive generations of more capable mobile networks and devices and compelling applications emerge. And crucially, data services are the only way MNOs will offset long-term declines in their voice/SMS service revenues. But this shift to data-centric service delivery also imposes added operational challenges in maintaining that ‘always on, fast – and secure’ mobile broadband performance and availability that subscribers have come to expect.
We’ve seen it happen to today’s leading retailers –credit card data breaches through Point of Sale (POS) malware that violate customer security, burden the financial institutions and devastate the reputations of the attacked retailers. Payment processing technology is the locus for the malware to collect vulnerable data during encryption and then use it to make unauthorized, fraudulent transactions. POS malware is a continuous problem, resurfacing in new forms including Dexter, Project Hook, Alina, BlackPoS/Kartoxa, JackPoS, VSkimmer. We hope you can join us for this week’s webinar “More than One Target: Point of Sale Malware Campaigns Continue,” as we explore a newly discovered POS attacker’s toolkit, as well as the structure and behavior of typical POS malware and key indicators of compromise.
Additionally, this presentation will review a survey of observed POS infrastructure vulnerabilities that include well-known and lesser- known POS threats that continue to evolve. Attendees should leave with an expanded sense of the threat surface that retailers – including eCommerce organizations – must face. The session will wrap up with an overview of best practices for protecting, detecting, and addressing these evolving threats.
Attend this webinar to learn about:
• The various types of POS malware threats and the implications of experiencing an attack
• The tools and processes that retail IT infrastructure teams need to have in place to protect their organizations from attacks
• Best practices for dealing with a POS attack; actionable “now what” steps for organizations who have been compromised by POS malware
The live webinar is on Tuesday, April 29 at 11:00EDT. If you can’t make the live presentation, you can still register to receive a link to the recording.