There is no such thing as the hack-proof computer.
Once we accept that reality, the next challenge is to acknowledge that a certain amount of IT risk is a part of conducting business. Risks also come in many different forms. I'm often asked which is worse -- regulatory, policy or compliance risk? I believe it may...
The Federal CIO Council recommends that agencies' decision to permit social media must involve a collaborative, risk-based decision-making process that requires strong business justifications that identify mission requirements.
Years ago, when I learned to drive and got my first cars, my approach to automobile maintenance was: If the "Check Engine" light came on, keep driving. Whatever the problem is, I'll drive out of it.
I see a disturbingly similar pattern now in the banking industry.
As summer draws to an end, schools reopen and Labor Day arrives, there's something else that everyone is looking to return: the H1N1 flu virus. U.S. organizations handled the so-called swine flu virus spread in the spring, but now is the time to ask: Are you and your staff ready for its return?
The news story going around about the couple that was granted permission to sue their bank because of lackluster security measures interests me in a few different ways.
This one was almost predictable.
We were just days away from Aug. 1, the date after which the Federal Trade Commission (FTC) would start enforcing compliance with the Identity Theft Red Flags Rule.
Then came the announcement from the FTC that it's going to extend the deadline. Again.
It's become a Friday night ritual over the past year or so. Wait til 5 p.m., and then watch the clock to see how many after-hours bank failure notices come through from the FDIC or OCC.
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
Driving home every day along the New Jersey highways, I often see the signs offering "Save Your Home from Foreclosure" with a toll free number to call for more information.
It is the sign of the times. Foreclosure rescue scams are on the rise, along with mortgage fraud.
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations.
Do you want to explain to your customers how you lost control of their personal financial...
OK, so today's the day.
After two months of anxious anticipation, today is May 19, the deadline Visa set for financial institutions to file fraud claims related to the Heartland Payment Systems (HPY) data breach.
So...now what?
And so it begins ...
As this morning dawns on San Francisco, so begins the 2009 edition of the RSA Conference.
As anyone in information security can tell you, this is the Mardi Gras, the Super Bowl, the event in the industry. It's where security professionals from all walks of the public and private sectors come...
OK, so here's a reaction I never expected.
We've talked a lot about the banking crisis over the past year - the differences between Wall Street and Main Street, and how all financial institutions are impacted in one way or another by fallout from the industry's "3 B's," Bailouts, Bernie and Bonuses.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.