"As an employee of a local government information security organization ... I implore you to consider a new approach to our joint efforts to secure information infrastructure."
From mobile malware to the Anonymous hacktivist attacks, how can banking institutions tackle the changing threat landscape? Joe Rogalski of First Niagara Bank has some new ideas.
For years, security experts have advised users to wipe their hard drives before discarding them. About 100 owners of one brand of tablets may have wished they did.
Regulators have hinted at it, and industry experts say it's coming. U.S. banking institutions can expect to see new guidance for mobile banking. The open questions are: When, and in what form?
Risk assessments are over. Now it's time for institutions to prove they conform to the FFIEC's Authentication Guidance. Fraud expert George Tubin offers tips to prepare for the first regulatory exam.
What steps can smaller organizations and their vendors take to ensure security and regulatory compliance? They must transcend what researcher Wendy Nather calls the 'Security Poverty Line.' See how.
President Obama uttered the term "cyber" only once in his 7,200-word State of the Union address Tuesday night, but that fleeting moment about an hour into the speech could prove significant.
Financial institutions still have a long way to go to fight fraud and mitigate online banking vulnerabilities. But what exactly are the top vulnerabilities, and what can institutions do about them?
As 2012 nears and federal regulators prepare to examine financial institutions for conformance with the FFIEC Authentication Guidance, just how prepared are banks and credit unions? The answer may surprise you.
Donna Flynn says Liberty Bank discovered three key gaps when it tackled FFIEC authentication guidance compliance. Two were easy to fill. The third required an out-of-the-box solution.
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
In their efforts to conform with the FFIEC authentication guidance, many financial institutions are caught off-guard by the overall cost of enhanced detection and authentication for online banking. Why?
IEEE sees 2012 as a disruptive year of widespread mobile-device intrusions as a growing number of smartphones - now 20 percent of the market - make them an attractive target for hackers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.