IT Security requires effective control over physical IT assets. Radio Frequency Identification (RFID) methodologies bridge gaps left by conventional process, electronic/software, and barcode tracking solutions. Using compact, rugged, specially designed tags and flexible integration frameworks, leading RFID solutions...
Anti-money laundering has been one of the dominant stories in financial services this year, and the trend isn't likely to abate anytime soon.
In this exclusive interview, attorney and AML expert Ross Delston discusses:
The latest AML trends, including Trade-Based Money Laundering;
How institutions are...
To quote from his own biography, Eugene H. Spafford is one of the most senior and recognized leaders in the field of computing. He has an on-going record of accomplishment as a senior advisor and consultant on issues of security and intelligence, education, cybercrime and computing policy to a number of major...
I can't say enough about the mud slinging and finger pointing being done during the continuing mortgage crisis. It is getting ugly out there. Even the government-sponsored enterprises Fannie Mae and Freddie Mac are now under the watchful conservatorship eye of the federal regulators, as the mortgage foreclosures top...
Career opportunities abound for people interested in entering information security as an entry-level or mid-career position.
In this exclusive interview, Matt Bishop, Professor of Computer Science at UC-Davis, discusses:
His current projects, including vulnerability analysis and the insider threat;...
In recent years, the hacking community has shifted its efforts toward a new frontier: the application layer. With most companies spending thousands, if not millions, of dollars securing the perimeter with network firewalls, intrusion prevent systems, and other devices, hackers have realized the lowest hanging fruit...
This whitepaper presents an overview of the security options that can help thwart fraud today and into the future, including multi-factor authentication and fraud detection solutions. With a clear understanding of the tools available and a way to effectively begin and evolve, organizations can take the essential steps...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
What's the most important factor in signing off information security projects at a bank? For Jon Pascoe, Director of Information Security at Arvest Bank located in Arkansas, the highest consideration is adequately protecting customer data and information and reaching higher standards in safeguarding confidential...
With all the focus on banks and credit unions' work to comply with the ID Theft Red Flags Rule, many in the financial services industry have forgotten that the largest share of entities impacted by this new regulation are non-banking institutions -- finance companies, automobile dealers, mortgage brokers, etc.
And...
It was a busy weekend for bank regulators, with the FDIC closing a bank in Nevada on Friday evening and the Treasury's takeover of mortgage giants Fannie Mae and Freddie Mac on Sunday morning. Both events are symptomatic of the country's troubled economy, as well as signal flares to other financial services entities...
To me, this is one of the sleeper stories of the year.
The ID Theft Red Flags Rule, Business Continuity and Anti-Money Laundering have dominated the headlines - and banking/security priorities. But recent attention paid to Application Security has the potential to fuel one major fire drill in 2009.
When I started this job a year ago and reached out to banking/security leaders, the overwhelming message I got was "Security awareness - we don't do it well."
For banking institution employees, maybe there was an information security training seminar when they first started. Or an occasional workshop on identity...
With an estimated damage toll that may reach $12 billion, the aftermath of hurricane Gustav's track through Mississippi, Louisiana and other states finds banks and credit unions cleaning up and reopening their institutions.
Now being the "prime time" for hurricanes, all eyes remain closely fixed to television...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.