The Reserve Bank of India issued guidance in April, 2011 for banks to mitigate the risks of use of information technology in banking operations. Here is an overview of the nine topics specifically addressed by the guidance.
"The biggest change these guidelines are bringing is in making information security a board level issue for all banks," says Kamlesh Bajaj, CEO of DSCI.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
The 9/11 attacks did not just affect America; they impacted the world. The events of that day stir frightening memories in everyone. In the end, every nation is vulnerable to terrorism.
Government officials have confirmed a potential threat by al-Qaida against the United States as the nation approaches the 10th anniversary of the Sept.11, 2001 terrorist attacks that hit the World Trade Center and Pentagon.
The Treasury Department's Office of Terrorism and Financial Intelligence has worked to prevent anti-money laundering and illegal cash flow from reaching the hands of terrorist groups, but more needs to be done to further mitigate risks, says Treasury Assistant Secretary Daniel L. Glaser.
Although those in the field understand very well that the CFPB will have an enormous impact on privacy policy-making responsibilities, questions remain about what the agency will actually do.
Are executives spending too much time and energy focused on external hacks, sacrificing attention they should be paying to internal threats? It's good that business leaders understand insiders pose risks, but are they taking those risks as seriously as they should?
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
Banks and commercial customers are more often working together, enabling them to catch and stop fraudulent requests for funds transfers before commercial accounts are drained.
The bright spot is that 36 percent of the takeover incidents reported in 2010 were stopped before fraudulent funds transfers were approved. That's an improvement from 2009, when only 20 percent were thwarted.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.