For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations.
Do you want to explain to your customers how you lost control of their personal financial...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
Individually, banking institutions, law enforcement agencies and regulatory boards understand the risks of money-laundering crimes.
But collectively, in active collaboration, they could do much more to prevent, detect and investigate these crimes, says AML expert Kevin Sullivan.
In an exclusive interview in...
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly ¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
As the swine flu outbreak triggers new fears of a global pandemic, security organizations must dust off and review their emergency management plans. For insight on how to prepare for swine flu, pandemic expert Regina Phelps offers expert insight on:
What you need to know about swine flu;
How your organization...
The annual RSA Conference was held in San Francisco April 20-24, bringing together the nation's - in some case's the world's -- top security experts, leaders and vendors for a week-long exploration of the day's top threats and opportunities.
Cybersecurity. Cloud Computing. Encryption. Public/Private...
To this point, information security professionals have been generalists. Going forward, they'll have to be specialists. At least this is the opinion of John Rossi, professor of systems management/information assurance.
In an exclusive interview on the future of the information security profession, Rossi...
"Knowledge is the currency of the future," says Sidney Pearl, Global Director of Enterprise Security Solution management for the Unisys Global Financial Services business.
And according to the latest Unisys Security Index, Americans are getting much smarter - and more demanding - about the basic information...
It's a simple proposition for successful applicants to the Scholarship for Service (SFS) Program: Get your information security education paid for, and then come work for the U.S. government.
"It's one of the most generous scholarships I've ever seen," says Victor Piotrowski, Lead Program Director of SFS for the...
At a time when many businesses are contracting because of the recession, Investors Savings Bank in New Jersey is continuing to grow its consumer and commercial banking operations - and without federal government investment. The goal, says Kevin Cummings, President and CEO, is to be a different kind of bank - one that...
From the Heartland data breach to the new Massachusetts data protection law, privacy is the hot topic in business and government.
In an exclusive interview, Peter Kosmala, assistant director of the International Association of Privacy Professionals (IAPP), discusses:
The top privacy topics in business and...
Endpoint virtualization is one of the hottest emerging technologies for financial institutions, which are looking to maximize secure access to and management of key applications - while also controlling costs.
In this Emerging Technologies Insights panel, we hear from:
Matthew Speare of M&T Bank on how a banking...
Activity at the State Level Points Toward a Federal Data Breach Notification Law
Data privacy legislation -- the trend started in California and is being discussed heatedly in Massachusetts today. Data breach notification and privacy laws have now been enacted in 40 separate states, and government observers think...
Insights on the Obama Administration's Early Efforts to Strengthen Financial Services
And so it begins. With Treasury Secretary Geithner's appearance before Congress, requesting greater authority over non-banking institutions, the Obama Administration is starting to flex its muscles in preparation for a complete...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.