In light of evolving fraud threats, financial institutions increasingly are turning to two-factor authentication solutions. Alex Doll, CEO of OneID, offers advice to help institutions make the right choices.
Eric Bangerter, an executive with a $1.6 billion institution in Wisconsin, explains why the risks associated with mobile apps led his team to opt for using a Web-based platform for mobile banking instead.
Cloud computing providers must step up and develop approaches to prevent their employees from stealing or harming customer data they host, say two experts from Carnegie Mellon University's CERT Insider Threat Center.
The industry conversation about fraud prevention often focuses on a single strategy, scheme, or attack. But it fails to look at the broader context for the attacks and the collective scope of schemes against which financial institutions must defend themselves and their account holders. As the title of this webinar...
We have just completed the third wave of distributed-denial-of-service attacks against U.S. banks. And while there is no evidence these attacks will end soon, there are signs that the attackers' botnet is getting stronger, and they are targeting organizations outside the U.S. and banking. How can organizations...
A recent spear-phishing attack involving a Trojan designed to target Android devices offers an important reminder of the emerging threat of mobile malware, says Kaspersky Lab researcher Kurt Baumgartner.
Ask chief information officers about the effectiveness of education and training to reduce cyber-vulnerabilities, and you'll get a big shrug of the shoulders - at least from half of them.
Targeted threats, highly advanced methods and well-funded, motivated perpetrators make standard Internet and network security measures an insufficient defense against advanced persistent threats (APTs). While traditional perimeter and infrastructure protection may help prevent or delay the initial network penetration,...
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for your employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and...
A Defense Department report to Congress says China could use the targeted information to benefit its defense and high-technology industries as well as give Chinese policymakers a clear picture of U.S. leadership thinking on key China issues.
Hacktivists' OpUSA distributed-denial-of-service attack against U.S. government and banking websites proved to be unsuccessful, experts say. But why was this attack a failure?
Mark Weatherford, who recently stepped down as DHS deputy undersecretary for cybersecurity, says that although planned OpUSA DDoS attacks may initially be a nuisance, they represent a genuine long-term threat to the government.
New security threats demand a new approach to security management. Security teams need a security analytics architecture that can handle a much greater volume and wider scope of data than at present, not to mention provide them with tools to lead them quickly to the most pressing issues. They need threat intelligence...
This white paper provides a cutting-edge view on why large organizations can no longer rely on preventive security systems, point-security tools, manual processes and hardened configurations to protect them from targeted attacks and advanced malware. Henceforth, security management must be based upon continuous...
If the hacking community judges the planned OpUSA cyber-attack a success, it could spur more nefarious actors to try more vicious disruptions of U.S. websites, a Department of Homeland Security alert says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.