It's never easy arising from security or technology to become a business leader in a financial institution. In this exclusive interview, Paul Perini - who came to security from the business side - offers practical insight on:
The qualities an information security leader needs to possess in order to be a successful...
The insider threat is at the forefront of financial institution concerns these days, and a huge part of mitigating that threat is improving identity and access management. Read this interview for insights from Subhash Tantry, CEO of Fox Technologies, on:
Five principles of an effective access control management...
Security Strategies from Lee Rothman of MessageLabs
With the heightened demands of regulatory compliance and e-discovery, managed message security and archiving is a huge challenge for financial institutions. Listen to this interview for expert advice from Lee Rothman, Sales Engineer at MessageLabs Inc., on...
Howard Sprow, vice president of Business Continuity Planning for the Securities Industry and Financial Markets Association (SIFMA) is a long-time leader in emergency management issues in the financial services industry. Recently we interviewed him on SIFMA's work in business continuity and pandemic planning.
When it comes to pandemic preparation at U.S. financial institutions, it's a case of good news/bad news.
Bad news first: Many midsized and smaller financial institutions are not fully compliant with the recent FFIEC pandemic guidance and don't have formalized pandemic preparedness plans yet in place.
But the good...
MaryAnne MacIntosh of Nu Union Credit Union Discusses Her Growing Initiative
Security awareness is a key topic - for financial institution employees and customers alike.
At Nu Union Credit Union in Lansing, Mich., MaryAnne MacIntosh oversees a program that educates everyone from the board of directors to...
Interview with Philip Alexander, Information Security Officer
Offshore outsourcing - it's a topic that stirs great debate among banking/security leaders. Proponents tout the potential cost-savings and easy access to top talent. Opponents point to cultural, infrastructural and, yes, security concerns inherent in...
Roberta J. Witty, CISSP and research vice president at Gartner, has more than 30 years of experience in information technology, including positions at major financial institutions. Witty recently chaired Gartner's Business Continuity Management summit held in early March. We caught up with her, and she shared her...
The hurricanes that devastated the Gulf Coast regions in the summer and fall of 2005 are nothing new to most people. The personal tragedies, loss of life and property were well documented by the national media.
But what about the story of one financial institution that weathered the storms and emerged intact - its...
Debit card fraud is one of the most prevalent security threats against banking institutions and customers alike. In this interview, Daniel McIntyre, information security and business recovery analyst with Superior Bank of Birmingham, AL., shares his insight on:
The magnitude of the debit card threat;
Strategies...
Wireless Internet access can offer convenience and mobility. But there are steps you should take to protect your wireless network and the computers on it.
Internet auction sites give buyers a "virtual" flea market with new and used merchandise from around the world; they give sellers a global storefront from which to market their goods. But the online auction business can be risky business. Among the thousands of consumer fraud complaints the Federal Trade Commission...
Never assume that the rules of one auction site apply to another. If the site offers a step-by-step tutorial on the bidding process, take it. It may save you frustration and disappointment later.
Under federal law, you're required to advertise your product or service and the terms of the sale honestly and accurately. You can't place "shill" bids on your item to boost the price or offer false testimonials about yourself in the comment section of Internet auction sites.
Some email users have lost money to bogus offers that arrived as spam in their in-box. Con artists are very cunning; they know how to make their claims seem legitimate. Some spam messages ask for your business, others invite you to a website with a detailed pitch. Either way, these tips can help you avoid spam scams:
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.