In terms of information security, what is the state of auditing as we end 2009 - and what are the trends foreseen for 2010?
Warren Stippich Jr., Practice Leader of the Chicago Business Advisory Services Group of Grant Thornton LLP, discusses:
Where organizations are most vulnerable;
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were being hit from every angle with fraud schemes -- some were old, and some were new variations. Here is a roundup of the 10...
The top breaches of 2009 can be described in many ways, but the first word that comes to mind is "big."
With the announcement in January of the breach that surpassed the 2005 TJX breach, Heartland Payment Systems leads all of the hacks that hit or affected the financial services industry in 2009.
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Three banks were closed by state and federal regulators on Friday, Dec. 11.
With these closings, the year's tally of failed institutions rises to 163 - 133 banks and 30 credit unions that have been closed, acquired or placed into conservatorship.
Information Security as a profession is amidst an evolution.
From a traditional, technology-oriented role safeguarding critical information assets, the career is progressing toward integration with the strategic thinking of organizations. Led by President Obama, the U.S. has embraced cybersecurity as a national...
How much do you actually know about time and the critical role it plays in your organization?
In a preview of his new webinar, Time: The Hidden Risks -- How to Create Compliant Time Practices, Bill Sewall discusses:
Why time is such a critical business issue;
Risks and opportunities presented by time;
We've experienced two waves of the H1N1 pandemic. What lessons have we learned?
Sue Kerr, President of Continuity First, a business continuity/disaster recovery consultancy, talks about how organizations have handled H1N1. She also discusses:
the state of BC/DR;
Challenges facing organizations today;
What's ahead for information security professionals in 2010?
Barbara Massa, VP of Global Talent Acquisition at McAfee, Inc. speaks to the results of the new Information Security Today Career Trends Survey, discussing:
How the results speak to the maturity of the information security profession;
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
An undisclosed number of HSBC customers had personal data exposed online about their bankruptcy proceedings, according to a data breach notification letter dated November 20 and sent to the New Hampshire attorney general's office. The letter was made public last week.
OK, it's year-end and everybody is thinking about the biggest this, biggest that of the year - of the decade, even. And we'll have our own lists, too, no worries. There's a lot to look back upon this year, and even more to look forward to in 2010.
But what are on my mind today are the big stories that no one seems...
A missing laptop may have caused a security breach at Flagstar Bank in Grand Rapids, MI, according to a letter the bank sent to some of its customers on Nov. 25.
The bank's letter tells customers that a laptop owned by an unidentified bank vendor was stolen and held an undisclosed number of customer social security...