C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview he discusses top security trends and threats.
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Insider fraud;
Application security;
Cloud computing.
Axelrod is currently executive advisor for the Financial...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
Attacks against many financial institutions -- including one of the largest in history against Heartland -- continue to prevail throughout the second half of 2008. Many political hacktivism attacks result in countries defacing one another's Websites with the usual suspect countries including India, Pakistan, Russia,...
Application vulnerabilities are real and hackers are targeting industries that offer the best avenues for illicit monetary gains. At the same time, economic, competitive and time-to-market pressures are driving enterprises to use third-party commercial off-the-shelf (COTS), open source and outsourced code as part of...
There's something new in the air that retailers, especially the directors of information technology (IT) operations at the store, are starting to research and implement called "application whitelisting". This technology is being presented as the panacea for Payment Card Industry (PCI) compliance, and is being welcomed...
I had an interesting email from a colleague the other day. Turns out someone he knows had recommended that he read a post of mine from January in which I discuss the value (or lack thereof) of having controls in place that don't function. He wanted to let me know about the reach of BIS and let me know that our...
As banking regulators emphasize the necessity of application security, a broad-based consortium now sheds new light on the most common vulnerabilities.
Experts from more than 30 U.S. and international cyber security organizations, including the National Security Agency and the Department of Homeland Security's...
The annual BAI Retail Delivery Conference & Expo was held in Orlando, Fl in late November, focusing on innovative strategies and technologies.
Nick Burke, Director of Sales for Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUinfoSecurity.com, attended the event, meeting with many of...
Survey Results - banking technology executives reveal their institution's application security priorities heading into 2009
In a down economy application security is both a necessity and a competitive differentiator. Yet in a recent BankInfoSecurity.com survey, respondents showed that they had no reason for...
Couple things I'd like to quickly bring to your attention.
First, have you checked out any of the new Bank Information Security Handbooks we introduced last week?
These electronic editions compile highlights of our content - articles, interviews, blog postings, agency alerts, etc. - in a unique format that gives...
In a survey of more than 100 banking/security leaders, 57% of respondents say they are somewhat or very confident in their own applications, and 90% say application security is somewhat or a significant part of their overall information security programs.
However, when it comes to applications developed or managed...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.