This white paper explains, defines and enforces the necessity to implement policies for systems that contain and allow access to sensitive data. These policies are in place to help mitigate problems in case there are security holes that allow for accidental or intentional interception of critical information, i.e....
These new sites now make Information Security Media Group the largest global network of information security-focused media sites, reaching the most diverse audience of decision-makers in each of ISMG's key markets.
As 2012 nears and federal regulators prepare to examine financial institutions for conformance with the FFIEC Authentication Guidance, just how prepared are banks and credit unions? The answer may surprise you.
Fraud threats have changed little in the past decade. But their global scale has, and James Ratley, president of the ACFE, details how fraud examiners must change their approach to fighting these crimes in 2012.
As legal issues surrounding data breaches become increasingly complex, more organizations are turning to attorneys for post-breach response, says Lisa Sotto, a managing partner for New York-based law firm Hunton & Williams.
Save Mart, the Calif.-based supermarket chain, offers new details and an FAQ about the investigation into the payments card breach that now is estimated to impact hundreds of customers and accounts.
Revised guidance from the National Institute of Standards and Technology, SP 800-63-1, could help organizations protect themselves from a growing threat to their information assets: the insider.
Michaels, Save Mart and Subway. Each of these companies was victimized by point-of-sale fraud, and security experts say the fraudsters' patterns offer valuable security tips to merchants and financial institutions.
Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.
Donna Flynn says Liberty Bank discovered three key gaps when it tackled FFIEC authentication guidance compliance. Two were easy to fill. The third required an out-of-the-box solution.
With many questions left unanswered regarding comprehensive cybersecurity legislation, the future seems bleak. But there's hope, says Jacob Olcott, a former top Capitol Hill staffer on cybersecurity matters.
BITS, the technology policy division of The Financial Services Roundtable, has just named a new VP of cybersecurity and fraud prevention. What's John Carlson's mission, and what's it mean to banks?
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
Value? It's coming in more shapes and forms than ever before, says Kosta Peric of SWIFT. So how can financial institutions embrace these new values and provide products and services that meet growing consumer demand?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.