When it comes to curbing ACH fraud, banking regulators and law enforcement agencies have joined forces to keep institutions abreast of emerging best-practices. What are their top recommendations?
The latest spin on the insider threat: malicious outsiders taking advantage of inadvertent insiders, says Dawn Cappelli of Carnegie Mellon University. Learn how to detect and prevent these attacks.
Payments processor First Data warns about an uptick in trolling - hackers sniffing networks for easy access to merchants' point-of-sale systems. What can banks do to help merchants prevent breaches?
If you handle critical data, you've got to be humble, advises Bob Carr, CEO of breached processor Heartland Payments System. "Anyone that thinks they're not going to be breached is being naïve."
Among the provisions of the Federal Information Security Amendments Act, approved by a voice vote, is a requirement that agencies implement continuous monitoring of their IT systems to identify vulnerabilities before a cyber incident occurs.
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
Though not perfect, says House Cybersecurity Co-Chair Jim Langevin, D-R.I., "CISPA represents an important good-faith effort to come together as a necessary first step toward better cybersecurity for our nation."
A security firm has uncovered a wave of fraud striking corporate checking accounts in the U.S., U.K. and China. How are the criminals gaining access to supposedly secure banking credentials?
Minnesota Attorney General Lori Swanson has issued a six-volume investigative report on Accretive Health Inc., a medical debt collection company that her office sued in January in connection with a data breach incident and other business practices.
The Texas attorney general furnished lawyers challenging the state voter ID law encrypted disks of a database of 13 million voters, with about half displaying citizens' full Social Security numbers.
What do the proposed Stage 2 rules for the HITECH Act electronic health record incentive program have to say about encryption and other security measures? Consumer advocate Deven McGraw provides an analysis.
The White House says President Obama would veto a bipartisan House bill that civil libertarians contend would threaten individual privacy but many businesses contend is needed to defend against cyber attacks.
Lyndon Bird, technical director of the Business Continuity Institute, praises the ISO 22301 standard for business continuity, calling it "An end to uncertainty." Learn about the emerging standard.
Weeks, months or even years often go by before organizations discover they've been hacked, not learning of the attack until law-enforcement authorities inform them, says recently retired FBI Executive Assistant Director Shawn Henry.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.