About a year ago I was in process of trying to find an information security professional to augment existing staff. Our company used a personnel firm who specialized in placing contract IT and security professionals. It occurred to me that we weren't very circumspect about requiring background investigations before...
Security-naive machines are about to swarm onto your precious networks.
Brace yourself.
Brian McKenna is the editor of Infosecurity Today (www.infosecurity-magazine.com)
McKENNA: We know from surveying our readers that they are very focused on the medium term. In other words, what the security threats are going...
Cyber-criminals are targeting the most vulnerable access points within businesses - employees - to execute their attacks, a new study finds.
In its annual closely watched security report, IBM warns that although widespread virus outbreaks are on the decline, on the whole online attacks are expected to rise in 2006....
Biometrics, the use of electronically- stored records of physical identifiers that corroborate a person's identity, is now moving out of the realms of fiction and into everyday life. Already there are reports that more than 60 hospitals in the UK use fingerprint technology to access patient files. Commercially, the...
New Trojans Target Bank Accounts
A new breed of malicious software doesn't even bother to steal victims' bank-account numbers and passwords - it simply lies in wait until they log into their account, then transfers money out. That warning comes from anti-virus technologists from MessageLabs, a security firm. These...
There are many unpleasant tasks in life and work. Monitoring employee behavior is one of those unpleasant tasks. Management has to take a strong role in insuring that liability does not come the company's way, i.e., Risk Management. New regulations hold management responsible for employee behavior which can cause the...
The CSO Magazine Security Sensor, a bi-annual survey of 420 chief security officers (CSOs) and senior security executives conducted by IDG's CSO magazine, reveals business resiliency and disaster recovery as the top ranking priority for security chiefs in 2006 - up from the third most important priority in 2004. ...
The contract management software market is moving toward a merger and acquisition spree. Choosing the right vendor can be a risky proposition. This does not mean organizations should delay a contract management purchase. Instead, it means decision makers should carefully weigh the pros and cons of purchasing an Oracle...
The demands of new regulations, including the Sarbanes-Oxley Act, Gramm-Leach-Bliley, the Patriot Act, and disclosure statutes for security breaches, are forcing banks to implement stringent information security measures. The auditing of information technology - once a rather staid component of a an auditing firm's...
Contracts perform a critical role in determining the value of a business relationship. For organizations managing large volumes of contracts, contract management software can help improve relationships with vendors and customers, decrease inflated costs, and ensure compliance.
Contract Lifecycle Management...
Prior to September 11, 2001, business continuity and disaster recovery plans were primarily developed by and geared to individual financial firms - with firms establishing, testing and refining their own plans. The event of 9/11 showed us in horrifying detail how vulnerable these firms are - and how dependent they are...
This publication is not from one of the Federal or State Banking Agencies, but given our extremely diverse audience, this will be of interest to organizations and individuals responsible for developing and maintaining security plans and programs.
The objective of system security planning is to improve protection of...
Nearly four out of five technology professionals believe employees are putting their companies at risk by failing to act safely online, according to new research.
In a study by anti-virus firm Sophos, 79% of the IT workers polled said that in spite of their group’s instructions, many employees continue to...
Information systems capture, process, and store information using a wide variety of media. This information is located not only on the intended storage media but also on devices used to create, process, or transmit this information. This media may require special disposition in order to mitigate the risk of...
Recent and current pressures on IT security managers in publicly quoted companies to tick regulation boxes have about five more years to run. NetIQ security strategist Chris Pick believes that the discipline of risk management, taking companies beyond mere compliance, is "not there yet†as a driver of IT...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.