It's been almost a year since the Financial Crimes Enforcement Network (FinCEN) issued its red flag advisory about foreclosure scams. Now it looks like the agency sees another spike in mortgage modification scams hitting the U.S.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The Information Security Today Career Trends Survey identifies three distinct education trends re: information assurance:
Information security professionals seek advanced degrees;
Organizations are footing at least part of the bill for training;
Online education is an increasingly common and effective...
The issue of how existing online banking networks could be used to ease the exchange of healthcare information will be addressed at a "medical banking" conference in Atlanta Feb. 28-March 2.
The Medical Banking Institute is sponsored by the HIMSS Medical Banking Project. The Healthcare Information and Management...
Four banks were closed by state and federal regulators on Friday, Feb. 19. The largest of the failed institutions was La Jolla Bank, a Pasadena, CA.-based bank with $3.6 billion in assets.
There have now been 21 failed banks and credit unions so far in 2010.
Increasingly, digital forensics is an important element of an information security program for organizations of all types and sizes.
But where can security leaders find qualified forensics professionals? How can these professionals obtain the skills and expertise they need to be successful?
Rob Lee of Mandiant...
Richard Chambers, President of the Institute of Internal Auditors (IIA) has three words of advice for organizations, executives and auditors looking to improve the role of internal audit: "Follow the risk."
In an exclusive interview, Chambers discusses:
Impact of the economic recession on internal audit;
When it comes to enterprise security, an organization gets its tone from the top - even when the tone is set accidentally.
How do you set the right tone? That's the topic of the new book from former CISO Jennifer Bayuk: "Enterprise Security for the Executive: Setting the Tone from the Top."
In an interview about...
"Systems compromised by this botnet provide the attackers not only user credentials and confidential information, but remote access inside the compromised networks," says Amit Yoran, CEO of NetWitness, which revealed the Kneber attacks.
Alex Cox, Research Consultant and Principal Analyst, NetWitness
Alex Cox, a research consultant and principal analyst at the IT security firm NetWitness, discovered last month the Kneber botnet, a variant of the ZueS Trojan that he says has infested 75,000 systems in 2,500 corporate and governmental organizations...