Why are breaches in the payments arena so difficult to trace and investigate? Verizon breach investigator Dave Ostertag offers insights about the forensics complexities of a processor breach.
For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?
The web-services protocol developed by the National Institute of Standards and Technology allows desktops, laptops, e-tablets and smartphones to access sensors that capture biometric data such as fingerprints, iris and face images.
What might the Global Payments breach investigation entail? Dave Ostertag of Verizon's Investigative Response unit describes a forensics investigation - how long it can take and what it might reveal.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
Netgear, Liaison Technologies and Specops were among the organizations to issue product/solution news releases at RSA Conference 2012 on Wednesday, Feb. 29. See the latest announcements from the show.
"The role of expert witness will only become more critical as our dependency on electronic data increases," says Eric Cole, who offers tips on how to pursue these opportunities.
Digital forensics is a growing field with plenty of opportunities for information security pros. Here are the five key steps to take to help ensure a fruitful career.
When it's time to stand up in court and discuss forensic evidence in a legal matter, you need someone who knows your business best, says Greg Thompson, VP enterprise security services at Scotiabank Group.
We all know the online shopping risks consumers face on CyberMonday. But how does the BYOD mobile computing trend impact risks to organizations from their own employees shopping on the job?
How did fraud specialists at Chase successfully thwart an alleged ATM skimming scheme that impacted 1,500 customers? The bank's fraud-detection efforts draw praise from Gartner's Avivah Litan.
When it comes to responding to today's high-profile information security incidents, technical abilities simply aren't enough, says Gavin Reid of Cisco's Computer Security Incident Response Team. Here are the five must-have skills for today's incident response professionals.
Police say financial specialist Librado Wright spent months siphoning more than $500,000 from Wachovia Bank's customer accounts. But when he attempted to withdraw the funds, the bank had a surprise for him.
"Forensics in the cloud is not necessarily a new field, but requires a new skill set and being able to learn on the fly," says Rob Lee, curriculum lead for digital forensics at SANS Institute.
"The more that you could focus in on computer science topics, to understand programming, network-based technology and mobile-based technology, the better off you're going to be," says Rob Lee of SANS Institute.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.