Dropsmacked and Boxed In: Understanding the New Threats in Online File Sharing

File synchronization and sharing is a hot technology category - Forrester has even called it "the hottest since social networking". According to Forrester, usage has quintupled from 2010 to 2012...
Continue reading
0 Comments

The Next Stage of Fraud Prevention: Balancing Risk and Customer Experience

The Next Stage of Fraud Prevention: Balancing Risk and Customer Experience
Save to My Briefcase
Send Email
Financial institutions conduct more business than ever online, and now encounter an increasing risk of fraudulent transactions throughout the customer lifecycle. The challenge? Balance the need to maintain low fraud...
Continue reading
0 Comments

10 Ways to Mitigate the Risk of a Data Breach Disaster

10 Ways to Mitigate the Risk of a Data Breach Disaster
Save to My Briefcase
Send Email
The best way to handle a serious data breach is to prevent it. While no security system is 100% effective, it's been noted that a substantial number of major breaches...
Continue reading
0 Comments

Proactive DDoS Defense: Steps to Take Before the Attack

Sony. Spamhaus. Nearly 50 U.S. banks. These are just some of the best known victims of the recent waves of sophisticated distributed-denial-of-service attacks. At best, these attacks distracted security personnel...
Continue reading
0 Comments

Business Continuity: What's Overlooked?

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Dan Shannon
Safeguarding All Business Processes Is Key Credit Eligible Dan Shannon ACQ Subscribe When building a business continuity plan, banking institutions too often overlook certain key processes that must be maintained...
Continue reading
0 Comments

Expanding Continuous Diagnostic Effort

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Expanding Continuous Diagnostic Effort
States, Local Governments Can Tap Into $6 Billion Program   ACQ Subscribe John Streufert, the DHS director overseeing the rollout of a federal continuous diagnostic initiative to mitigate IT systems...
Continue reading
0 Comments

Implementing Continuous Monitoring Plan

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Implementing Continuous Monitoring Plan
DHS's John Streufert Addresses the $6 Billion Challenge   ACQ Subscribe The massive initiative to deploy continuous monitoring at U.S. federal government agencies will be done in phases, with the...
Continue reading
0 Comments

Account Takeover: The Fraudsters' Edge

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Julie Conroy
Anti-Fraud Investments at Banks, Retailers Lagging Credit Eligible Julie Conroy ACQ Subscribe Account takeover fraud is growing globally, and it's not just banks that are suffering, says analyst Julie Conroy....
Continue reading
0 Comments

Should CISO Be Chief Risk Officer?

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
<a rel="author" href="https://plus.google.com/109948240304376053479">Eric Chabrow</a>
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Identifying CISO's Role in Managing Risk in the Enterprise Many chief information security officers have the business savvy and technical know-how to be their organization's chief information risk officer. But...
Continue reading
0 Comments

Bank Attacks Round Four: "Good Guys Wield Wooden Shields in Era of Armor Piercing Ammunition"

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Carl Herberger
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Immutable Rule #1: All Defenses Decay as a Function of Time By Carl Herberger, September 9, 2013. Carl Herberger "We've made the investments in our shields, they must work" -...
Continue reading
0 Comments

Patent Infringement Suits Target Smaller Banks

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
What Steps Should They Be Taking to Minimize Risks? Patent infringement suits are a growing concern for banking institutions, as response to our recent coverage related to patent disputes proves....
Continue reading
0 Comments

Readying Iris Recognition for Prime Time

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
<a rel="author" href="https://plus.google.com/109948240304376053479">Eric Chabrow</a>
Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Authentication Method Needs Some More Work Federal researchers have reconfirmed the reliability of the iris as an authentication factor. But we're at least three years away from using iris scanning...
Continue reading
0 Comments

Pennsylvania Casino Reports Data Breach

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Pennsylvania Casino Reports Data Breach
Information on Customers, Employees Compromised Credit Eligible Las Vegas Sands Corp. is investigating a data breach that compromised information about some patrons and employees at its hotel and casino in...
Continue reading
0 Comments

Continuous Diagnostics: A Game Changer

Phyllis Schneck
Phyllis Schneck Phyllis Schneck, the Department of Homeland Security's deputy undersecretary for cybersecurity, equates the department's continuous diagnostics and mitigation initiative with a medical probe detecting an infection in the...
Continue reading
0 Comments

Security Professionals: Time to Step Up

Security Professionals: Time to Step Up
  In the wake of high-profile breaches and data leaks, the government will pay a lot more attention to information security. Are security pros ready for this scrutiny? Professor Eugene...
Continue reading
0 Comments

Phone Security Legislation Introduced

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Rep. José E. Serrano
Senate, House Bills Would Require 'Kill Switches' to Wipe Data Credit Eligible Rep. José E. Serrano Rep. José E. Serrano , D-N.Y., has introduced legislation in the U.S. House of...
Continue reading
0 Comments

Cyber's Role in Ukraine-Russia Conflict

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
A Crimean self-defense group stands ready, (Photo: Voice of America)
Will West Respond in Cyberspace to Russia's Actions? Credit Eligible A Crimean self-defense group stands ready, (Photo: Voice of America) Russia's offensive military actions in Crimea and its threats to...
Continue reading
0 Comments

The Impact of Bit9, Carbon Black Merger

The Impact of Bit9, Carbon Black Merger
The recent merger of Bit9 and Carbon Black will eventually result in a single, merged product offering, says Benjamin Johnson, CTO at Carbon Black. "Every one of our existing customers...
Continue reading
0 Comments

Cybersecurity Priorities Unveiled in FY 2015 Budget

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Federal budget coming off the presses. (Government Printing Office photo)
'Whole-of-Government' Approach to Incident Response Proposed Credit Eligible Federal budget coming off the presses. (Government Printing Office photo) President Obama's fiscal year 2015 budget outlines a set of priorities -...
Continue reading
0 Comments

Payment Card Fraud Sparks Tensions

Save to My Briefcase
Send Email
Get permission to license our content for reuse in a myriad of ways.
Payment Card Fraud Sparks Tensions
Card Issuer Points Finger at Processors Over Breach Credit Eligible First American Bank is warning its customers against using their payments cards in Chicago-area taxis until a suspected data breach...
Continue reading
0 Comments