From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
A bill that backers say would fortify the IT security of the nation's critical infrastructure and government by codifying, strengthening and providing oversight of the mission of the DHS has cleared its first hurdle.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
Cybersecurity frameworks, supply chain risks and malicious insiders - these are among 2014's hot topics, according to Alan Brill at Kroll. What are the year's other key cybersecurity priorities?
Undeterred, two senators will try again to get their colleagues to enact legislation that they contend would better safeguard sensitive information and notify consumers of a data breach when personally identifiable information is exposed.
CareersInfoSecurity's inaugural Top 10 Influencers list recognizes the leaders from business, education and government who are making groundbreaking efforts to have a great impact on information security careers in 2014.
First Target, then Neiman Marcus; who's next? And while banking institutions await the next attack, how should they respond to customers' anxious questions about this latest round of high-profile retail data breaches?
Target Corp. is providing $5 million to help fund an effort to educate consumers about the risks of cybercrime. Meanwhile, a group of House Democrats had called for a hearing about the retailer's breach, while two senators have demanded details.
Banks can significantly reduce their levels of bad debt and collections expenses by specifically targeting first-party fraud. Advanced network analytics with real-time screening is the key to early detection and prevention of risk threats before they result in large losses.
Download the white paper to...
Financial services firms enjoy a few advantages over organizations in other industries. Banks and investment firms tend to have larger IT/security budgets and highly experienced security staff members. Large metropolitan banks also have more lucrative salary structures, and so they also have the luxury of recruiting...
While news of the NSA's data collection caught many off guard, it's just another example of the U.S. culture of surveillance, says sociologist William Staples, author of the book "Everyday Surveillance."
Five significant trends, including the mobile revolution and the use of big data, will influence the future of cybersecurity, says Allan Friedman, co-author of a new book on the subject.
Target now says personally identifiable information for up to 70 million of its customers was likely exposed in the December breach that also compromised some 40 million U.S. debit and credit cards.
In 2013, financial Trojans targeted more than 1,400 institutions in 88 countries - and these attacks are only growing. Symantec's Vikram Thakur tells how organizations can combat attackers in 2014.
Federal agencies audited by the Government Accountability Office showed inconsistent responses to computer breaches involving personally identifiable information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.