To be filed under the category of "One small step, one giant leap ..."
It's just come to my attention that when President Obama revealed his administration's cybersecurity policy at the end of May, the document's introduction featured a prominent reference to an article published on our sites in February of this year.
The power of social networking web sites can be measured by just looking at the number of hits (or visits) to a person's web page on such well-known sites as MySpace or Facebook.
The negative side web users should consider before placing information on such social networking sites include the connection one...
OK, so today's the day.
After two months of anxious anticipation, today is May 19, the deadline Visa set for financial institutions to file fraud claims related to the Heartland Payment Systems (HPY) data breach.
I certainly wasn't around during the Spanish Flu pandemic of 1918-1919 - I vaguely remember the 1968 Asian Flu pandemic as a small child - but some of my relatives recall that health catastrophe of 88 years ago.
My 95-year-old great uncle remembers the 1919 school year as being abbreviated, cut short as a second...
The first federal CTO thinks the new federal CTO also could serve as the federal cybersecurity czar.
Norm Lorentz served as the federal chief technology officer in 2002 and 2003, working within the White House Office of Management and Budget. In that job, Lorentz focused on developing the federal IT enterprise...
Hi. This is Tom Field, Editorial Director with Information Security Media Group. Welcome to today's session entitled Log Management: How to Better Safeguard Customer Data. Your presenters and sponsors today are Chris Peterson, Founder and CTO of LogRhythm, and John Earl, CTO and Vice President of PowerTech. ...
It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
This is something that used to really get me going as an information security practitioner. Someone would forward me (and everyone else they knew) an email that had the most dire of warnings - "EMAIL VIRUS WILL WIPE YOUR HARD DRIVE - Do not open !!!"
Angry about the Heartland data breach?
Anxious because you have an upcoming regulatory exam?
Frustrated by the effects of the global recession, and wondering when the heck we're going to climb out of it?
I was thinking after my last few Heartland-centric posts that I should probably get back to covering the basics of our practice and re-focus on all things regulatory. So I started skimming through my notes from recently completed fieldwork looking for ideas. The last few engagements happened to be with Credit Union...
The numbers are staggering as we try to get a handle on exactly how many institutions, cards and customers have been affected by the Heartland breach.
One single institution's report of the number of cards compromised by the Heartland Payment Systems (HPY) data breach - 10,000.
We're barely out of January, and already this year has revealed itself as one to remember. Between the worsening conditions within the banking sector, the Heartland breach and a very noticeable shift in the regulatory climate, we're already hard pressed to pick this year's "Story of the Year." And somehow I suspect...
Phishing, malware and the Nigerian 404 scam. These are among the top 2009 agenda items for the M&I Corporation in Wisconsin - not just to fight the threats, but to make customers more aware of them.
Customer awareness is a huge priority for Wisconsin's largest bank, says Scott Coghill, CISM, Vice President,...
Last week the NCUA announced the formation of the National Examination Team (NET) to "enhance the supervisory process in areas where economic conditions have adversely impacted federally insured credit unions." Or as I like to think of this move, the FDIC sneezes, and NCUA catches a cold.