Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Understanding the trends and patterns of the past is the key to understanding the future, and security is no exception. The following security threat trends for 2008 have been assembled as a result of their frequency during security audits performed last year. These common and fundamental security issues typically...
Data security breaches add millions of dollars to bottom line expenses, but there is also the immeasurable cost of security breaches on your brand that affect future revenue and growth. Virtually every financial institution today exchanges large amounts of information both inside and outside the organization....
Philip Alexander, Information Security Officer at a Major US Financial Institution
Data leakage - it's one of subtle insider threats to information security at financial institutions. It's tough for leaders to know exactly where their critical data resides - never mind how it's being treated when it leaves the...
Data loss prevention (DLP) is a challenge for institutions of all sizes. But not all banking/security leaders understand the scope of the threat, where it originates and how best to eradicate it. In this interview, DLP expert Jared Thorkelson discusses:
What's most misunderstood about DLP;
The greatest sources of...
Interview with DLP Expert Jared Thorkelson
Data loss prevention (DLP) is a challenge for institutions of all sizes. But not all banking/security leaders understand the scope of the threat, where it originates and how best to eradicate it. In this interview, DLP expert Jared Thorkelson discusses:
What's most...
Continuous member service is an important deliverable for credit unions, and is probably the most obvious sign to members that a credit union has its priorities set appropriately. While data recovery has always been important, there are trends in the industry today that put your data recovery strategy in the...
The hackers that broke into Hannaford Brothers, a northeast U.S. grocery chain, may have spawned other attacks, including one at Okemo Resorts in Ludlow VT. As law enforcement and forensic experts continue to sift through the evidence of these attacks, the retailer and the ski resort remain mum on further...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
The price tag for The TJX Companies, Inc.(NYSE: TJX) to settle with MasterCard and its card-issuing banks is $24 million. This settlement, announced this week, comes on the heels of the TJX settlement with the Federal Trade Commission in late March.
While many in the industry see the FTC's settlement (no fines, but...
Data loss needs to be addressed before it occurs. Small businesses often use one primary computer to store client and accounting data. Large businesses rely on centralized servers or storage devices, which typically use a single hard drive for multiple users to store data. Many businesses have a single point of...
The insider threat is at the forefront of financial institution concerns these days, and a huge part of mitigating that threat is improving identity and access management. Listen to this interview to hear Subhash Tantry, CEO of Fox Technologies, on:
Five principles of an effective access control management...
More than 220 million private records have been breached in the last three years. With the average cost of a data-leak incident reaching $6.3 million in 2007, organizations of all sizes must act to protect sensitive data.
One industry that is keenly aware of the importance of safeguarding personal information is...
For more than a decade, government and industry bodies around the world have issued a growing number of regulations designed -- in whole or in part -- to ensure the security, integrity and confidentiality of personal and corporate data . Combined, these individual regulatory guidelines outline what constitutes best...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.