The New Year started where the old one left off: Federal and state banking regulators closed a pair of banking institutions on Friday, Jan. 8.
In Washington, Horizon Bank of Bellingham was closed by the Washington State Department of Financial Institutions. And in California, the Bakersfield-based Kern Central...
It's been over a year now since banking regulators began examining institutions for compliance with the Identity Theft Red Flags Rule. What have been the common deficiencies, and what will examiners be expected in year two?
Jeff Kopchik, senior policy analyst with the Federal Deposit Insurance Corporation (FDIC),...
How prepared is the financial services industry in the event of a cyber attack?
The Financial Services Information Sharing and Analysis Center (FS-ISAC), a national industry forum, will conduct Cyber Attack Against Payment Processes (CAPP), an exercise to measure the ability of financial institutions, payment...
What are the new year's top trends in banking, payments and security?
Javelin Strategy & Research has just released its Top 10 Trends report for 2010. James Van Dyke, president of Javelin, discusses:
Top headlines from the new report;
Biggest threats to banks, payments and security;
The "next big thing" in...
Philip Foley, a former marine, is a senior security analyst for governance, risk and compliance at Verizon Cybertrust Security. He works a minimum of 40 hours per week with extensive travel - and then dedicates another 10-12 hours to pursuing an online graduate degree in Information Assurance from Norwich University.
2010 is the Chinese year of the tiger - a fitting image for banking/security leaders that must be vigilant against the information security threats that challenge financial institutions and their customers.
To prepare for this New Year, we've prepared a Banking/Security Agenda that looks at fraud, regulatory...
Information security is the hot career option for professionals in 2010 and beyond.
This is the prediction of David Foote of Foote Partners, the FL-based consultancy that tracks IT skills and competencies. In a look ahead at 2010 and beyond, Foote discusses:
the security careers "bubble" and how it began;
Earlier this week, I blogged on what have been the most popular interviews I've conducted in 2009 - and there have been a lot of them.
Today I'd like to talk about my favorite interviews of the year. And there have been a magnificent seven of those.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
This is always a fun exercise.
I spent some time today looking back over all the articles we published (so far) in 2009.
And that number is 891, by the way - an average of just over 17 per week, or three-plus per weekday. But the number that concerned me most is 10 - what have been the top 10 most popular stories...