In response to today's cybersecurity challenges, Southern Methodist University has selected Frederick Chang to head a new program that will address top issues - including how to fill the skills gap.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
Banks have a critical role to play in helping other industries with DDoS mitigation, as DDoS targets are expected to shift. Attacks against U.S. banks are proving increasingly ineffective because banks have enhanced their defenses.
The House Intelligence Committee warns of threats Chinese chips pose to American IT systems. A new film embellishes that danger. Though pure fiction, the plot could help raise the public consciousness about cyberthreats.
"We've made the investments in our shields, they must work" - this statement must have been decried by legions of ancient soldiers as this age-old defense decayed before their eyes and they were crushed on the battlefield. In fact, the graveyard is littered with 'proven' defense strategies which, given time, have...
Account takeover fraud is growing globally, and it's not just banks that are suffering, says analyst Julie Conroy. Here, Conroy explains why fraudsters continually have the upper hand.
How relevant is customer education? Readers weigh in with thoughtful responses to two recent guest blogs that tackle the question from two perspectives: the education proponent and the critic.
What is it going to take to address current and future IT security staffing needs? One answer: Attracting young, bright minds that are up for the challenges ahead, says USC's Winnie Callahan.
Here's an argument for why recent indictments linked to what's been called the largest-ever card fraud scam won't deter fraud - and why improved security is a better deterrent.
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
When it comes to fighting fraud, technology can only go so far, says Nancy Guglielmo of BITS. So, how can banking institutions truly correct the user behavior that enables many fraud schemes?
Preliminary results of the 2013 Faces of Fraud Survey show institutions are still suffering big financial losses linked to ACH and wire fraud. Why are they still getting hit, in spite of investments to detect and prevent account takeover?
Addressing cyber-attacks is not just a technology issue. It requires a holistic view from the entire organization, says ISACA's Jeff Spivey, who emphasizes the need for a framework approach to security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.