Are financial institutions implementing the multifactor authentication laid out in the FFIEC Guidance? That was one of the issues discussed at the RSA panel presentation, "37 Days After the FFIEC Guidance Deadline." The panel of banks, credit unions and industry experts talked about what it took to get this far, and...
LINDA MCGLASSON: Welcome to another podcast in our podcast series. I’m Linda McGlasson with BankInfoSecurity.com, and today we’re speaking with Catherine Allen, CEO of BITS, the financial services roundtable. Catherine Allen is a noted innovator and visionary in the financial services industry. Named...
Information Security Media Group recently attended the RSA Conference 2007, the premier information security conference representing more than 200 comprehensive educational sessions and close to 400 of the top vendors in the infosec industry. The following audio is a selection of recordings taken on the expo floor...
Voice verification is a form of biometrics that involves using voice prints and recognition of the user's phone, a combination known as a voice token. It is regarded as a next-generation authentication technology.
The more-advanced voice recognition systems record and store combinations of sounds and notes. For...
A former FBI agent/computer specialist, Schmidt is one of the world’s top information security luminaries who helped lead the escalating war against cybercrime. He is one of the most credible and influential names in information security, and was Microsoft’s CSO and later eBay’s CISO. He’s...
During Howard Schmidt's remarkable career in public and corporate service, he has seen it all from the inside. He began his information security career in government in the U.S. Air Force and helped establish it's groundbreaking computer forensics lab. He then moved into law enforcement. Later he left public...
Visa is mounting a full-scale blitz to encourage merchants to use payment software that doesn't compromise consumer passwords. The card company has asked merchants to ensure that the software they use to process card transactions doesn't store the full contents of "track data", which contains passwords and other...
EMC Corp.'s recent acquisition of RSA Inc. underscores the convergence of information security and storage. EMC, which sells large storage systems for use in corporate data centers, bought RSA - a manufacturer of encryption software and devices - to provide it with identity and access management technologies and...
Secure Socket Layer (SSL) is a protocol developed by Netscape in 1996 which quickly became the method of choice for securing data transmissions across the Internet. SSL is an integral part of most web browsers and web servers and makes use of the public-and-private key encryption system developed by RSA.
In order...
In this guide you will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.
We will also touch on the role of...
Who knows? Maybe two and three–factor authentication will become a thing of the past and five–factor authentication will take its place. The same issue with encryption has been encountered over the years. With this example in mind, does it make sense for law to be involved in the technological details?...
Some security practitioners react to new technologies with panic and the issuance of stern edicts against using USB drives/PDAs/EVDO cards/wireless LANs, etc. Stop and take a deep breath. In most cases, users have a legitimate need to fill. It is your job to find a way for them to fill that need safely, not to keep...
Marcia Wilson- BankInfoSecurity.com Editor
In the year 2005, there were over 53 million individuals affected by security breaches wherein their personal information was compromised. The ChoicePoint incident was considered one of the first highly publicized events where notification to the individuals affected was...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.