Over the past 10 years, a primary concern for financial institutions was securing the perimeter of your network from attack by anonymous hackers. Today, your perimeter is secure, and your next biggest threat is from within. How is this? Security gaps created by silos...
Today, financial institution employees...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Understanding the trends and patterns of the past is the key to understanding the future, and security is no exception. The following security threat trends for 2008 have been assembled as a result of their frequency during security audits performed last year. These common and fundamental security issues typically...
At A Time When Preserving Customer Trust Is Critical, Financial Institutions Bank On Technology Solutions
The credit crisis and security threats have pushed financial institutions to step up their efforts to secure personal data and ensure their customers' trust.
Download this white paper for case studies of...
LendingTree, Societe Generale, TD Ameritrade. These are just a few of the most recent high profile examples of fraud and theft perpetrated by trusted insiders - and its costing these organizations billions of dollars. How is this happening?
Do you have more employees than active accounts?
Do you know who is...
Arizona Central Credit Union of Phoenix, AZ., was hit with a phishing attack via text message to its members in March. While the attack was distributed on a small scale and didn't have much impact, the incident did roust the credit union staff into quick action.
Sadly, such incidents are a familiar...
One midwestern credit union (which prefers to remain anonymous), with nearly $200 million in assets and more than 30,000 members, has been phished four times -- the most recent in 2006, with three of those incidents occurring within a 90-day period.
So what do you do if your financial institution's brand is...
Risk management and the insider threat.
These are the two dominant themes emerging from the conversations and presentations at the RSA Conference in San Francisco this week.
From the keynote stage to the expo floor, with stops in between at the program sessions, information security experts, vendors and...
Imagine living in a country where electronic voting is universal, there are 39 million Internet users, and 25 million of them are also Internet banking users.
Welcome to Brazil, whose online banking services and lessons-learned were presented to attendees at the RSA Conference on Tuesday.
According to Maria...
Bank of America is well known for its mobile banking services. Currently, the institution has 750,000 mobile banking customers receiving services on 400 different kinds of devices.
But did you realize that one of the ways BoA secures its electronic offerings is by providing its customers with abuse reporting...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
The insider threat is at the forefront of financial institution concerns these days, and a huge part of mitigating that threat is improving identity and access management. Listen to this interview to hear Subhash Tantry, CEO of Fox Technologies, on:
Five principles of an effective access control management...
For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Combined, these individual regulatory guidelines outline what constitutes best...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.