Consumer fraud trends suggest banking institutions will lead the fight against ID fraud, and international regulators are taking closer looks cross-border payments and money laundering.
Understanding the contact versus contactless variables for an implementation of EMV in U.S. is the first step, says Smart Card Alliance's executive director.
Community hospitals must become more vigilant about information security, especially as they apply for federal electronic health records incentive payments, says Chuck Christian, CIO at Good Samaritan Hospital in Vincennes, Ind.
Organized crime was responsible for 85 percent of all stolen data in 2009. And stolen credentials were the most common way to gain unauthorized access into organizations.
Cybersecurity Coordinator Howard Schmidt unveils a White House blueprint to create an online environment where people and business can complete transactions in confidence.
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's new about federated ID management;
Challenged to...
Interview with Tom Smedinghoff of Wildman Harrold
The topic has been discussed for years, but now truly is the time for organizations to invest in federated identity management.
So says Tom Smedinghoff, partner at Chicago-based law firm Wildman Harrold. In an exclusive interview, Smedinghoff discusses:
What's...
Financial institutions must address a growing number of regulations designed to ensure the security, integrity and confidentiality of customer and corporate data . Regulations are often mandatory and compliance must be verifiable. In many cases, organizations and their company officers found to be non-compliant may be...
Joe Bernik, a banking and security veteran, has recently joined Fifth Third Bank as its new CISO. Among his challenges: preventing external attacks and building better internal relationships with business partners.
In an exclusive interview, Bernik discusses:
The evolution of information security and risk...
It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
In the early days of the AS/400®, life was simple: "dumb terminals" ruled the computing kingdom and application menus blocked users from direct database access. Then, personal computers evolved and file transfers between PCs and servers became common - the "secure menu" became a thing of the past.
Today, we must...
This white paper outlines a sound process-based approach in protecting critical privileged accounts that are found in virtually every application, database and infrastructure device throughout enterprises. This paper will present BeyondTrust PowerKeeper as a solution to secure passwords for privileged accounts in...
The landscape of hackers is filled with stories from those whose job is to hunt them down. SANS forensics instructor, Rob Lee, also a senior forensics consultant at the IT security consultancy Mandiant shares three "villain" examples of the types of attacks being seen in the field by the company's forensic...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.