The Security Industry Association has released an updated version of its privacy framework, outlining best practices to use when deploying evolving electronic security technologies.
Fraudsters are increasingly turning to prepaid cards to move money and perpetrate fraud, says payments fraud expert Tom Wills. Today, prepaid cards are the new money mules, he says.
Years before she helped put fraudster Albert Gonzalez behind bars, Kim Peretti was an attorney who had dual interests in law and technology. How did she channel her interests into a prominent career?
Even so-called minor breaches can cost organizations nearly $200,000, according to one finding from NTT Group's annual Intelligence Report. Rob Kraus of Solutionary shares the study's insights and advice.
Manufacturers of a wide variety of devices that link to the Internet can improve security by turning to processes IT has used for nearly a generation, says Tony Sager of the Council on Cybersecurity.
In this white paper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible...
Two suits against California's First Foundation Bank raise a number of questions about how to define reasonable security and how banks are expected to react when suspicious account activity occurs.
Information security professionals seeking new opportunities should look to San Diego, where jobs in the sector could grow as much as 25 percent this year, according to a new report.
Although cyber security risk is now top of mind among executives and regulators, measuring and managing security risk levels has been a difficult task. Current risk management tools offer limited visibility and leave organizations vulnerable to emerging threats internally and within the networks of business partners...
Identity and authentication management, or IAM, represents the greatest security return on investment an organization can make. Former National Coordinator for Security, Infrastructure Protection, and Counter-terrorism for the United States, Richard Clarke, once famously said, "If you spend more on coffee than on IT...
With every new data breach revealed or costly identity-theft case reported, consumer confidence in the security of online banking erodes. This loss of confidence in online services can have a direct impact on the ability of financial institutions to reduce costs and increase efficiency through the online-banking...
An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.
Fandango and Credit Karma have reached settlements with the FTC on charges that they failed to secure the transmission of millions of consumers' sensitive personal information from their mobile apps.
With a need for more than 4,000 new specialists over the next two years, the U.S. Cyber Command will look within the military for help, providing training to enlistees to re-invent themselves as cyber pros, Defense Secretary Chuck Hagel says.
For each high visibility targeted attack that has been made public, we really don't know how many have gone either undetected or undisclosed. Like an insect going through metamorphosis from one stage to the next, APT attacks are by definition multi-stage. Defenses must be specifically formulated to thwart APT's at...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.