President Obama met with technology company executives critical of his administration's surveillance program a day after a federal judge ruled that portions of the National Security Agency program could be unconstitutional.
A federal district court judge's ruling that a National Security Agency program collecting metadata from telephone calls could be unconstitutional suggests that the law hasn't kept pace with changing technology.
Most fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model.
Cybersecurity risks posed by inadequate IAM and IT asset management are mounting. Now the National Cybersecurity Center of Excellence has drafted guidance to address banking institutions' unique risks, says Nate Lesser, the center's deputy director.
A combination of technical and managerial problems set the stage for hackers to breach a Department of Energy database last summer, a new report shows. The incident cost the department millions of dollars.
As a leading provider of financial services to agribusinesses, Rabobank Australia and New Zealand has many rural customers. Internet banking is an important service for customers that are located far from bank branches.
To address customer concerns while mitigating the potential risks, the bank needed ways to protect...
The final version of the FFIEC's guidance on social media use clarifies how banks should assess consumer and third-party risks. But suggested controls for employee risks are still missing.
To encourage information sharing about cyberthreats, banking institutions need to be protected from liability through the enactment of new federal legislation, says Paul Smocer, president of BITS.
NSA Director Gen. Keith Alexander says the agency has taken 41 actions to prevent leaks by insiders in the wake of disclosures of classified documents about the agency's surveillance programs by former agency contractor Edward Snowden.
Call center fraud is one of the leading threats that financial institutions will battle next year because fraudsters consider the centers to be an easy target. But what can be done to mitigate this threat?
While U.S. payments networks and card issuers are planning to transition to EMV cards, Gartner analyst Anton Chuvakin says they could be wasting their time. It may be too late for this chip technology in the U.S.
A letter from eight prominent online companies to President Obama and Congress calls for reform of government surveillance programs, outlining concerns about the way the NSA monitors online and telephone communications.
The theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says.
As security leaders continue to have a growing influence with C-suite executives and boards of directors, they need to overcome communication challenges, says IBM's David Jarvis.
The privacy and security risks posed by the Internet of Things will pose a growing challenge for IT security professionals who manage online transactions and relationships, says ISACA's Robert Stroud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.