The FTC proposes that privacy protections be built at every stage in developing online products and consumers be given the option to decide what information is shared about them and with whom through a do-not-track system.
Increasingly, social engineers target unwitting insiders to plunder organizations' financial and intellectual assets. How can you prevent these and traditional inside attacks? CMU's Dawn Cappelli offers tips.
Components manufactured overseas that go into IT products used by the U.S. government could be exploited by foreign intelligence agents to degrade the security of critical federal government networks and data, the GAO reports.
As one team of researchers analyzes a new version of Duqu, a worm related to the Stuxnet Trojan blamed for disabling Iranian centrifuges used to enrich uranium, other researchers zero in on who is behind the worm discovered last fall.
The average per capita cost of a data breach has declined from $214 to $194, according to the new Cost of a Data Breach study. But there are still plenty of causes for concern, says Dr. Larry Ponemon.
The Defense Department will employ a two-prong approach - securing the perimeter as well as the data - as it develops its cloud-computing architecture. "We're going to be able to better protect as we get more standardized," CIO Teresa Takai says.
One of the most daunting threats enterprises face today is the Internet robot, or simply, the bot. These malicious programs strike in so many ways that traditional network security is often ineffective.
This paper outlines why a defense-in-depth strategy is needed to address the threats posed by botnets and their...
A recent research paper that raised questions about the efficacy of RSA public-private key cryptography shouldn't alarm IT security practitioners, says Eugene Spafford of Purdue University. Here's why.
Verizon's 2012 Data Breach Investigations Report shows dramatic increases in attacks linked to hacktivist groups like Anonymous and LulzSec. How should organizations respond to this evolving threat?
The U.S. Treasury has officially launched new sanctions against organized crime. What role do banks and credit unions have to play in this fight? Fraud experts at Ernst & Young offer insights.
Bank robberies are old-world crimes, but they are still devastating to institutions and their communities. How is the FBI now working with banks to change how they respond to these violent crimes?
The failure to implement proper security controls exposes Internal Revenue Services financial and tax-processing systems to potential insider threat, putting taxpayer information at risk, a Government Accountability Office audit says.
Jason Clark, CSO of Websense, has spent a significant amount of time meeting with over 400 CSOs. From his interactions, Clark offers his advice on how chief information security officers can be more effective.
Banking institutions have fought phishing and ACH fraud, but increasingly fraudsters are exploiting call centers. Where are the vulnerabilities and how can institutions fight back?
Protecting the availability, confidentiality and integrity of information are the core tenets of IT security. But an FBI cybersecurity leader, Steve Chabinsky, suggests the central theme of IT security needs to be broadened to include assurance and attribution.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.