Tag Archives: Operational infrastructure security management

The Essential Guide to Privileged Activity Monitoring

Key Security Risks related to Privileged Users “78% of large organizations were attacked by an unauthorized outsider in the UK, in 2012.” – Information Security Breaches Survey 2013 Business users accessing sensitive data Privileged users are a potential security risk in … Continue reading

IT Security News and Event, Shell Control Box , , , , , , , , , ,

Distributed denial-of-service protection

Overview Although DDoS attacks have always posed a formidable threat to internet systems, the proliferation of botnets and the advent of new attack vectors together with the rapid adoption of broadband globally in recent years have fuelled the potency of … Continue reading

MAS Technology Risk Management Guidelines , ,

Operational infrastructure security management

The IT landscape is vulnerable to various forms of cyber attacks8, and the frequency and malignancy of attacks are increasing. It is imperative that FIs implement security solutions at the data, application, database, operating systems and network layers to adequately … Continue reading

MAS Technology Risk Management Guidelines ,