Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Explosive growth in the mobile workforce has led to increasing attention paid to the security of mobile data and devices. Mobile data security is most effective when implemented in a series of layers: installing smart firewalls, deploying anti-virus software, and using encrypted connections. True mobile security...
Mini-documentary takes you inside the U.S. Cyber Challenge security treasure hunt, where competitors hack deep into a target information system to capture flags in a contest that combines skills and wit.
When it comes to banking malware, there are two threats: The actual software that is growing in sophistication and stealth, and then the level of awareness among banking employees and customers alike.
Organized crime was responsible for 85 percent of all stolen data in 2009. And stolen credentials were the most common way to gain unauthorized access into organizations.
How vulnerable are organizations to cyber attack? It depends on your definition of "vulnerable," says Robert Richardson, Director of the Computer Security Institute (CSI). "There's vulnerable," he says, "and then there's likely to be attacked."
In an interview about current threats, Richardson...
Securing a financial services network environment can be a daunting challenge. At issue is not only meeting the basic business requirement of ensuring that a customer's financial information remains private and secure, but to do so in accordance with the variety of regulations that have been implemented by state and...
In the early days of the AS/400®, life was simple: "dumb terminals" ruled the computing kingdom and application menus blocked users from direct database access. Then, personal computers evolved and file transfers between PCs and servers became common - the "secure menu" became a thing of the past.
Today, we must...
It's one of the newest and most popular stops on the Washington, D.C. tour, and its artifacts of history leave clues for how information security professionals should approach their future.
The International Spy Museum has just celebrated its 7th year and its 5 millionth visitor, says Executive Director Peter...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.