There is no such thing as the hack-proof computer.
Once we accept that reality, the next challenge is to acknowledge that a certain amount of IT risk is a part of conducting business. Risks also come in many different forms. I'm often asked which is worse -- regulatory, policy or compliance risk? I believe it may...
As people increasingly turn to information assurance to start - or re-start - a career, the nation's community colleges play a greater role in job training.
Erich Spengler, professor at Moraine Valley Community College near Chicago, discusses:
The role of community colleges in information assurance education;...
Bogus security software applications are among the types of electronic crimes that grew 585 percent over the first half of this year, according to a new study.
The Anti Phishing Working Group's (APWG) latest report shows that rogue anti-malware programs, infected computers and crimeware broke new records in the...
It's been a year since the financial services industry was first rocked by the global recession. The 'crisis of confidence' resulted in scores of bank failures, major mergers and acquisitions, and a very public cry for regulatory reform.
Three more banks were closed by state and federal regulators on Friday, Oct. 2, raising the year's tally to 112 failed institutions.
Warren Bank of Warren, Mich., Jennings State Bank of Spring Grove, Minn., and Southern Colorado National Bank of Pueblo, Colo., all were closed and their deposits acquired by other...
Interview with Shirley Inscoe and BC Krishna, Authors of Insidious: How Trusted Employees Steal Millions and Why It's so Hard for Banks to Stop Them
Insider fraud has always been a risk for banking institutions, but this risk has only grown in the past year. And so has the size of the crimes.
Shirley Inscoe and...
Bank of America's Chief Executive Kenneth Lewis has told the institution's board he will retire, effective Dec. 31. Lewis' successor has not been named. But Bank of America's board of directors says it will have one in place by year's end.
Two credit unions in California and Texas were liquidated by the National Credit Union Administration (NCUA) and state credit union regulators this week, and their assets were sold to other institutions.
Risk management. Audit & compliance. Fraud, investigations and forensics.
What do these three topics have in common? They're the information security areas with the greatest potential for job growth, according to our new Information Security Today Career Trends Survey.
Your organization has been breached - how should you immediately respond? How should you not respond?
Alysa Hutnik, attorney with Kelley Drye in Washington, D.C., specializes in information security and privacy, counseling clients on what to do after a security breach. In an exclusive interview, Hutnik...
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
The sixth annual (ISC) 2 Government Information Security Leadership Awards (GISLAs) will be announced at the GISLA Gala Dinner on Wednesday, October 7, 2009, at the Marriott Crystal Gateway in Crystal City, Arlington, Va.