Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. With regulatory compliance and industry data security standards dominating many of these business objectives, confidential data protection comes to the forefront of IT security....
Are you and your customers better off today than you were a year ago?
This is the key question to be explored in the Banking Information Security Today survey. The 2010 study explores how banking/security leaders are responding to today's key banking issues, including fraud prevention, regulatory compliance and...
What are the top fraud trends facing financial institutions in 2010?
Gartner's Avivah Litan shares her insights in an exclusive interview with Information Security Media Group's Linda McGlasson, discussing:
Increased number of attacks on strong authentication;
How to handle ACH fraud;
The biggest security...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Joe Bernik, a banking and security veteran, has recently joined Fifth Third Bank as its new CISO. Among his challenges: preventing external attacks and building better internal relationships with business partners.
In an exclusive interview, Bernik discusses:
The evolution of information security and risk...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
Securing a financial services network environment can be a daunting challenge. At issue is not only meeting the basic business requirement of ensuring that a customer's financial information remains private and secure, but to do so in accordance with the variety of regulations that have been implemented by state and...
As more financial and commercial activity move online, banks are seeking to bolster consumer security and confidence. Gartner, in a 2008 report, reveals that most consumers consider security features extremely important factors that influence their decisions to bank online and do ...
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
The number of identity fraud victims increased 12 percent to 11.1 million people in 2009 -- the second consecutive annual increase. At the same time, the total amount of fraud also increased by 12.5 percent to $54 billion.
These are the headlines of the newly-released 2010 Identity Fraud Study by Javelin Strategy &...
The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
What must financial institutions do to improve security education?
Identity theft expert Robert Siciliano shares his thoughts on the need to change the mindset of financial institutions when it comes to educating their customers about identity theft and security issues. Among the topics he discusses:
Why "old...
In times of economic turmoil, weaknesses of risk management systems in financial institutions have become very apparent. Shortcomings are most evident in mortgage-backed securities and collateralized debt obligations. Implementing an intelligent credit risk management solution would enable financial institutions to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.