After fingerprints, iris recognition is the second most supported biometric characteristic, and its popularity as a means of authentication is growing.
Patrick Grother is among the computer scientists at the National Institute of Standards and Technology's Information Technology Laboratory who are collaborating...
Months before announcing the Heartland Payment Systems (HPY) data breach, company CEO Robert Carr told industry analysts that the Payment Card Industry Data Security Standard (PCI DSS) was an insufficient protective measure.
This is the contention of a new master complaint filed in the class action suit against...
The next version of the Payment Card Industry Data Security Standard (PCI DSS), due out some time in 2010, may include guidelines for the use of virtualization technology to protect card data.
This was the prediction of some industry leaders meeting at the Payment Card Industry's Security Standards Council...
It's been an interesting year for the Payment Card Industry Data Security Standard.
In the middle of it all is a debate among payment card companies, banking institutions, merchants, industry groups and even congressional leaders, questioning the merit of the standard and all hinting at the same open question: What...
Critical approaches to affordable fraud detection
Financial institutions are offering more and more online and self-service applications, as well as expanding the methods that consumers can use to access these applications.
But with the constant addition of new banking applications and access methods, financial...
The news story going around about the couple that was granted permission to sue their bank because of lackluster security measures interests me in a few different ways.
Each RBAC implementation varies in its capabilities and method of management.
In a multi-platform environment, these differences introduce higher administration hours and costs because the various RBAC models are not consistent in administration and operation methodology. The differences among these implementations...
Do you truly know who's accessing your critical information systems?
The Heartland data breach and Countrywide insider crime remind us: These systems are vulnerable to malicious attacks from outside and within the institution.
And recent consolidations and mergers within the industry also underscore the...
In today's banking world, the importance of a comprehensive, reliable and scalable security infrastructure has never been greater. Thales HSMs have been used for over 25 years by a large number of banks worldwide mainly to protect customer PINs during credit and debit card transaction processing.
More recently...
The NISP Operating Manual (NISPOM) prescribes the requirements, restrictions, and other safeguards necessary to prevent unauthorized disclosure of classified information by US Government Executive Branch departments and agencies. NISPOM Chapter 8 addresses information-system security procedures and...
In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...
In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...
Organizations are being driven to increase the strength of authentication across a much broader user population than ever before. The most common way of authenticating employees and partners - username and password - is also one of the weakest in use today. Traditionally, providing stronger authentication using...
Every day I'm driving to or from work -- or even on the weekends - it seems like I hear about some new urgent priority that I must be aware of, whether it be the flailing economy, President Obama's directives, data breaches, or any number of other news-worthy items. But I love the news - so I don't mind!
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.