While vendor risk management has long been an area of concern for Financial Institutions, regulators are now looking for banks to do more and provide a higher level of assurance about the security practices of their vendors. But how? With regulators continuously raising the bar, one thing is clear: the vendor reviews...
Cyber risk is high on the list of the most significant risks that organizations face. Many businesses spend millions of dollars annually on people, processes, and technologies to protect themselves against cyber risk.
However, with little visibility into the success
of these investments, many organizations are still...
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
"Ransomware is now one of the fastest growing classes of malicious software," says Fedor Sinitsyn, a senior malware analyst at the security firm Kaspersky Lab. "In the last few years it has evolved from simple screen blockers demanding payments to something far more dangerous."
Ransomware attacks fall into two...
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
Email fraud has existed since the advent of email. But the schemes are evolving and impacting organizations' bottom lines. Robert Holmes of Return Path offers new strategies to defeat fraud attempts.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Even a few weeks after the RBI announced its plan to consider removal of the two-factor authentication requirement for small-value transactions, security critics continue to react strongly against the notion.
The message should be as loud as it is clear: Any type of organization is a target to attackers - you don't have to be a financial services company or a merchant. It isn't just financial data that's sought; intellectual property is a rich bounty, too. And don't discount the value of a good, old-fashioned disruption,...
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
You've screened your candidate, hired them into the position, assigned them resources and granted them access...now what? Hope they don't rob you blind? Trust them completely? The real job has just begun, now you have to:
Translate risk levels into appropriate levels of scrutiny, the greater the access, the...
Symantec named a Leader in the The Forrester Wave: Enterprise Mobile Management, Q3 2014. Read the Forrester Research, Inc report and get in-depth expertise on the enterprise mobility market.
We recommend this analyst report for anyone evaluating enterprise mobility solutions or looking to gain a better...
The U.S. Secret Service last year refused to provide DHS with information about vulnerabilities culled from the continuous monitoring of the protective service's IT systems as required by FISMA.
Proactively managing information within financial services has never been more important - and more challenging - than it is today. Tumultuous global financial conditions have given rise to two powerful - and sometimes conflicting - objectives: 1) to address data proliferation inside their firms, and 2) to enhance...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.