Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Network security is a big issue for financial institutions. From a small home office's DSL connection to a corporation's high-speed fiber connection, a company's network needs to be protected from outside threats.
Earlier this month, a criminal posed as Barclays Bank chairman Marcus Agius to get a Barclayscard from call center processing staff. Armed with the new card, he then walked into a London Barclays branch and withdrew 10,000 pounds. The criminal may have obtained personal details about the chairman online to get the...
Tucked away in the rolling hills just south of Lexington, KY is the farming community of Mt. Vernon, KY. Dennis Weiskircher, IT Manager and Security Officer at Citizens Bank www.citizensbankrb.comhere, has seen his share of Social Engineering scams.
"I find it surprising how many smaller banks are being targeted by...
It's About Protecting the Network Endpoints
Last week's announcement of yet another unencrypted laptop being stolen - this time it is retailer The Gap's recruiting vendor and its gaping lack of security (the vendor laptop was stolen with personal information of 800,000 applicants Gap Press Release ) opens another...
Detailed user-level auditing for your UNIX and Linux environment is essential to achieving business-critical goals like regulatory compliance (e.g., GLBA, SOX, PCI, etc.), protection against insider attacks, and the ability to troubleshoot and diagnose system availability issues.
Centrify's auditing, access control...
Have you sat down in front of your screen and tried to discover why it is taking forever to download or you've found while troubleshooting there's been something added to the numerous operations that your PC computes? It may turn out to be that the source of your PC's slowing is spyware, software that was installed on...
With consumers demanding 24/7 access to financial accounts and information, balancing customer desires for convenience with the need for solid protection is a difficult task. However, VeriSign Layered Security offers an effective option to serve both fronts. Learn how you can:
• Reduce complexity by integrating...
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
Financial institutions need intrusion detection systems that incorporate wireless
The biggest credit-card hacking incident in history exploited a weakness in wireless network security that could have easily been fixed. The lesson for financial institutions is to plug all such weaknesses before wrongdoers discover...
Securing the network against intrusion is more than complying with the Federal Financial Institutions Examination Council’s mandate for strong authentication—although it’s certainly that. It also makes good business sense. Financial institutions that implement information security technology and...
Secure Socket Layer (SSL) is a protocol developed by Netscape in 1996 which quickly became the method of choice for securing data transmissions across the Internet. SSL is an integral part of most web browsers and web servers and makes use of the public-and-private key encryption system developed by RSA.
In order...
In this guide you will find out how to test, purchase, install and use a thawte Digital Certificate on your Apache web server. Throughout, best practices for set-up are highlighted to help you ensure efficient ongoing management of your encryption keys and digital certificates.
We will also touch on the role of...
Security-naive machines are about to swarm onto your precious networks.
Brace yourself.
Brian McKenna is the editor of Infosecurity Today (www.infosecurity-magazine.com)
McKENNA: We know from surveying our readers that they are very focused on the medium term. In other words, what the security threats are going...
NIST Special Publication (SP) 800-56A, Recommendation for Pair-Wise Key
Establishment Schemes Using Discrete Logarithm Cryptography, is now
available . This document specifies key establishment schemes based on
standards developed by the Accredited Standards Committee (ASC) X9,
Inc.:
ANS X9.42 (Agreement of...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.