Securing a financial services network environment can be a daunting challenge. At issue is not only meeting the basic business requirement of ensuring that a customer's financial information remains private and secure, but to do so in accordance with the variety of regulations that have been implemented by state and...
In the early days of the AS/400®, life was simple: "dumb terminals" ruled the computing kingdom and application menus blocked users from direct database access. Then, personal computers evolved and file transfers between PCs and servers became common - the "secure menu" became a thing of the past.
Today, we must...
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
Identity and access management (IAM) deals with how users within an organization are given an identity - and how it is protected, including saving critical applications, data and systems from unauthorized access while managing the identities and access rights of people both inside and outside the...
Key Questions to Ask Before You Select a VM Solution
Vulnerability Management (VM) means systematically finding and eliminating network vulnerabilities. Choosing a solution for VM is a critical step toward protecting your organization's network and data.
Without proven, automated technology for precise...
Cybersecurity is a major priority of the Obama Administration, and at Carnegie Mellon University's Software Engineering Institute, it's a key component of the CERT Program's Survivability and Information Assurance (SIA) curriculum.
In an exclusive interview, Lawrence Rogers, chief architect of the SIA program,...
Have you asked yourself, "What threats (new and old) is our institution going to have deal with this year?"
What data security threats will be most prevalent for banking institutions?
The volume of attacks from international sources has and will continue to increase.
Data security breaches tied to theft...
The crime of deception is now even more deceptive.
Multi-channel fraud - schemes that are launched simultaneously via telephone, Internet, in person and via mail - is a growing concern for financial institutions. And the linked crimes aren't always easy to spot.
In this exclusive interview, security expert Diana...
The World Bank, an internationally-supported institution that provides loans to developing countries, is reported to have suffered a network intrusion that one insider labeled "an unprecedented crisis."
The breach, first reported by Fox News, alleges that servers in the Washington, D.C.-based bank's treasury unit...
In recent years, the hacking community has shifted its efforts toward a new frontier: the application layer. With most companies spending thousands, if not millions, of dollars securing the perimeter with network firewalls, intrusion prevent systems, and other devices, hackers have realized the lowest hanging fruit...
When most people hear "Social Engineering," they think of the criminal aspects of the term. But the practice also has professional applications for security practitioners who want to help test and improve organizations' security practices.
Social Engineering is the act of gaining unauthorized access to systems or...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.