Documenting procedures for the State Department's custom-made, continuous-monitoring tool known as iPost will help ensure that the data collected are appropriately used to protect the agency's global IT system, a GAO audit says.
Ian Harper of Pentagon Federal Credit Union says financial institutions should continually review their risk management processes, a recommendation reinforced by the new FFIEC Authentication Guidance.
Debit fraud in the U.S. continues to grow as transaction volume increases. As international markets move away from mag-stripe and toward chip & PIN technology, fraud experts say U.S. card issuers can expect to see fraud continue to escalate.
"We're continually testing our controls and the effectiveness of our controls. We do a lot of emerging-threats monitoring ... so we can react," says First Niagara's Joe Rogalski.
A California judge handed down a 12-year prison sentence to a phisher who stole financial details from more than 38,000 online accountholders. Observers say the sentence signals a changing attitude about the severity of cybercrimes.
"It's time to stop shifting the security burden onto retailers and restaurants like Margarita's," says Gartner analyst Avivah Litan on the latest payment card breach. "In fact, it was time for that over five years ago."
Scott Laliberte, managing director of Protiviti, wrote the book on penetration testing, and he has strong feelings about what organizations are doing right and wrong when assessing their information security risks today.
Some 200 people have reported fraudulent debit and credit transactions hitting their accounts after dining at Margarita's Mexican Restaurant in Texas. Investigators believe a third-party vendor may have been hacked.
"The first step is for banks to admit there is a problem before they can address it, and many bankers are still in denial," says Shirley Inscoe, author of the book "Insidious: How Trusted Employees Steal Millions and Why It's So Hard for Banks to Stop Them."
To assist federal agencies with the implementation of CyberScope reporting, IBM Tivoli Endpoint Manager, built on BigFix technology, provides insight and control for endpoints with streamlined, automated capabilities for continuously monitoring and remediating security compliance
This white paper touches on:...
"Any other bank could have just as easily been victimized," says banking fraud expert Shirley Inscoe, following the arrest of a former Citigroup executive charged with embezzling more than $19 million.
International cooperation is to thank for the takedown of one cybercrime ring accused of using the Conficker worms to steal more than $72 million from bank accounts spanning more than 10 countries.
Police in Beaverton, Ore., have asked for the public's help to identify four suspects who were caught on camera using fake payment cards allegedly created from details skimmed by fraudsters at area Michaels stores.
A breach of debit card accounts, which began in April, has so far affected nearly two dozen banks and credit unions in the Northeast Ohio area, including Keybank, Fifth Third and Century Federal Credit union.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.