Sitting here on the cusp of the Labor Day weekend, and I'm thinking ahead to what I believe will be the big stories - of interest to us in banking/security, at least -- in the final quarter of 2009. Here, in no special order, are my top three...
This one was almost predictable.
We were just days away from Aug. 1, the date after which the Federal Trade Commission (FTC) would start enforcing compliance with the Identity Theft Red Flags Rule.
Then came the announcement from the FTC that it's going to extend the deadline. Again.
Driving to my office yesterday, I listened to the radio as an announcer read the news of an FBI sweep that saw politicians and religious leaders arrested. The first group I wasn't exactly surprised about, but religious leaders? Well, I was listening even more closely when the radio announcer then said there were four...
If there's one thing I've learned about information security professionals, it's that they come in multiple flavors.
Yet, increasingly today, you want people who can run security like a business, feel comfortable in maintaining a seat at the table and are willing to work with changing governance
Looking for summer reading?
Just finished a new book, "Late Edition," by one of my favorite writers, Bob Greene. This is a touching, often funny memoir of Greene's days as a newspaper rookie in Columbus, Ohio in the 1960s.
The power of social networking web sites can be measured by just looking at the number of hits (or visits) to a person's web page on such well-known sites as MySpace or Facebook.
The negative side web users should consider before placing information on such social networking sites include the connection one...
In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...