Cybersecurity isn't a problem like air defense, where you would look to the government alone to provide the solution, Defense Deputy Secretary William Lynn III says. Cyberdefense must include nongovernment entities, too.
Defense Deputy Secretary William Lynn III meets with NATO Secretary General Anders Fogh Rasmussen, but works most closely with Ambassador GÃ¡bor IklÃ³dy of Hungary, the alliance's assistant secretary general for emerging security challenges
The president has levers of power that enables him to set the nation on a better path toward keeping our economy and citizens secure. They don't require congressional approval, but only political resolve and determination.
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
Expanding use of secure messaging as well as remote access to information systems are key 2011 IT priorities for Shriners Hospitals for Children, says Bill Bria, M.D., chief medical information officer.
Imagine drafting the top IT security minds into a defense force to protect the nation's critical IT infrastructure. Defense Minister Jaak Aaviksoo and other Estonian leaders mull the possibility of instituting such a draft.
Fraud attempts will escalate, not diminish, as new threats and channels blossom in 2011. Growth in mobile banking and the use of social networks are expected to pose new security challenges, experts say.
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations. Privacy concerns, regulatory compliance, and corporate guidelines all need to be factored into...
Mobile banking, Web 2.0, remote check capture - they're among the emerging technologies that appeal most to banking institutions. The key driver: the chance to offer more services to customers, and also cut costs through the further automation of banking transactions.
We recently spoke with leaders of the top...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...