In light of evolving fraud threats, financial institutions increasingly are turning to two-factor authentication solutions. Alex Doll, CEO of OneID, offers advice to help institutions make the right choices.
In an interview about the myths and realities of two-factor authentication, Doll discusses:
The current...
A Senate panel approved a bill to strengthen e-mail privacy protections despite concerns expressed by the head of the Securities and Exchange Commission that the legislation could hinder investigations.
Imagine this: A lewd picture of Anthony Weiner is sent from his Twitter account, and he claims his account was compromised, and that a hacker sent the image. Would you believe him?
Distributed-denial-of-service attacks against banks are popping up in parts of Europe. So what can we expect next in this ongoing wave of cyber-attacks? And will the major London banks be targeted?
Hacktivists' phase 3 DDoS attacks against U.S. financial services firms have entered their eighth week, and FS-ISAC spokesman Greg Garcia says concerns are mounting that a criminal element to the attacks could emerge.
A 143-point drop in the Dow Jones Industrial Average proves the power of social media and the havoc it can cause when an account gets hacked. It's time for social media companies to tighten the authentication process.
The UK government pledges at Infosecurity Europe to help businesses improve cybersecurity. But it's going to take more than vouchers and training to address Europe's top threats to security and privacy.
A new report by several GOP senators raises questions about the HITECH Act's electronic health record incentive program, including concerns about data security and privacy. But the senators overlook a number of key issues.
Phishing attacks are on the rise, and cybercriminals' methods are changing. How can the DMARC initiative help reduce phishing incidents? Phishing expert Paul Ferguson explains.
We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
A new survey reveals the willingness of consumers to accept other authentication factors beyond username and password, even if they require more work on their part.
Does legislation designed to get businesses and governments to share cyberthreat information provide adequate civil liberties protections? Find out what's at the heart of the debate.
To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.
Schnucks, a grocery chain that last month revealed it suffered a POS network attack, now says millions of payment cards were likely exposed. How many stores were affected, and was Schnucks PCI compliant?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.