One measure of an incident's impact is dollars lost of fraud. But the "soft" costs - loss of reputation and productivity - are the ones that most get the attention of Terry Austin of Guardian Analytics.
IT risk management, cyber insurance, privacy - these are hot topics for security leaders, but not for their boards of directors. Why do senior executives still fail to see IT risks as business risks?
Since the mid 1990s, financial institutions have struggled with the implementation of enterprise risk management (ERM) systems. Data is the lifeblood of these institutions, and data management is critical to the success of a strong ERM system. Yet even today, institutions struggle with compiling and efficiently...
Why are socially engineered schemes causing so many headaches? Symantec's new Internet Security Threat Report shows attacks are growing. Here's a list of Symantec's recommendations to thwart risks.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
As financial institutions expand their mobile banking services, fraudsters certainly will be close behind. This webinar will cover the expanding use of mobile banking and the fraud threats that are lurking, including:
The explosive growth of smartphone ownership and the resulting demand for improved mobile...
Cybersecurity threats are so great that the FBI recognizes its falling behind on them. What must be done to contain the flood of cyber criminals? FBI cybersecurity leader Steve Chabinsky offers ideas.
The Federal Bureau of Investigation warns of a scheme involving pop-up windows through which fraudsters trick travelers into installing bogus software updates. The "updates" are really malware installations.
Some of the most-connected people in D.C.'s cybersecurity community never heard of Michael Daniel, who will succeed Howard Schmidt when he retires as White House cybersecurity coordinator. Here's the skinny on Daniel.
A $1.5 million mortgage fraud scheme in Virginia shows that these complex scams continue to thrive. Why is this type of fraud so difficult to detect, and what can be done to prevent it?
The Department of Homeland Security has issued a report on the risks involved in using wireless medical devices and other mobile technologies in healthcare and the best practices for mitigating threats.
"You need to educate people, and you need to have the right control procedures in place to ensure that people are aware of insider fraud," says Larry Ponemon, offering tips to reduce insider risks.
In an interview about the insider threat, Ponemon discusses:
Key findings from this new research;
What needs to be...
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.