In a move to tighten down mortgage loan originators' credentials and stronger background checks, the federal financial institution regulatory agencies on Monday issued proposed rules that will require mortgage loan originators to meet registration requirements of the Secure and Fair Enforcement for Mortgage Licensing...
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
Bank fraud has evolved over the last several years, but some classic variations keep financial institutions busy.
Here are six old fraud tricks that are back with new twists to bedevil fraud departments and information security professionals.
General Motors filed for bankruptcy early Monday, marking the end of an era for GM, as the troubled automaker now represents the largest bankruptcy in history. Once the world's largest automaker, now the ailing giant will be forced to close more than 10 plants and cut more than 20,000 jobs.
So, General Motors files for bankruptcy today. Whoever thought such an event would unfold in our lifetimes - that the U.S. leader in one of the top industries of the 20th century would sputter into the 21st and end up broken down beside the road, like a car whose owner neglected to heed the "Check engine" light?
Manhattan District Attorney Robert Morgenthau announced this week that his office has indicted 18 people from New York City for operating a bank fraud and identity theft scheme. The scheme resulted in the cashing of more than 1,000 counterfeit checks at several large banks.
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
It's "tweet" time! Information Security Media Group (ISMG) has just registered with Twitter.com to start providing regular updates to audience members who also are enjoying the tweet life.
OK, so I know some of you out there are still kinda dying to know, but don't dare to ask - what is Twitter?
Individually, banking institutions, law enforcement agencies and regulatory boards understand the risks of money-laundering crimes.
But collectively, in active collaboration, they could do much more to prevent, detect and investigate these crimes, says AML expert Kevin Sullivan.
In an exclusive interview in...