The bring-your-own-device phenomenon has swept global businesses, and the challenge only intensifies with every new wave of smart phones, tablets and portable storage devices. It's no longer a question of whether organizations will allow employees to use their own mobile devices. That's already happening. The real...
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
Google and Facebook are in the mobile payments arena. But consumers still expect their banking institutions to secure the mobile wallet, says Alphonse Pascual of Javelin. What role must banks play?
As mobile transactions grow, so do the fraud risks. How is the Merchant Risk Council working with card issuers and merchants to address these threats? Nicolas Vedrenne of the MRC offers insight.
Some of the biggest threats to mobile banking and payments are the ones over which institutions have no direct control. How can they mitigate these risks? Mobile banking expert Tom Wills offers advice.
As banking institutions globally roll out more services through the mobile channel, security leaders are challenged to stay a step ahead of the evolving risks. But what are today's top threats, and what are the emerging security components institutions must put in place to take advantage of new mobile...
When it comes to mobile payments, consumers rely on banks and credit unions to be stewards of security. But how can institutions mitigate risk through a payments mechanism they don't solely own?
The Government Accountability Office justifies the need for further action, noting that malware variants aimed at mobile devices have risen to 40,000 from 14,000 in less than a year.
The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.
As a result of the recent Apple-Samsung verdict, CISOs at organizations need to be mindful of where their software is being sourced from, says patent attorney Jim Denaro.
The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Developing secure mobile applications is just one part of the process in creating new programs. Communicating how applications are secured is crucial in building IT security awareness among stakeholders.
The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.