Download this white paper and read how to make the ESSO evaluation process simpler and faster by identifying the critical questions you need to ask ESSO vendors as you evaluate their solutions.
These questions are organized into four key ESSO topics:
application support;
deployment;
ongoing management;
and...
This is a transcript of a recent webinar, Insider Threats - Safeguarding Enterprise Information Assets, sponsored by Imprivata. This session discusses the need and importance for convergence of physical and logical access control. To highlight the significance, Imprivata showcases their revolutionary product,...
Maybe the Countrywide television ads that constantly run on cable news shows I watch on weekends will now tout, "Finance your mortgage with Countrywide, and have your identity stolen at the same time for mere pennies."
The recent arrest of a former Countrywide employee in the insider identity theft case, where an...
"Whitelisting" is a new twist on information security. Instead of trying to find a software solution that keeps all of the potential bad guys out of your systems, whitelisting allows you to establish a protection layer that grants access to only your finite list of good guys - individuals or applications.
In this...
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their customers and critical financial/informational...
A former Countrywide Financial Corp. employee was arrested by the Federal Bureau of Investigation earlier this month in Los Angeles for stealing and selling sensitive personal information, including social security numbers on an estimated 2 million mortgage loan applicants from around the country for the last two...
The launch of the Payment Card Industry Data Security Standard (PCI DSS) has helped expose serious security shortcomings. The IBM System i (AS/400) presents its own unique set of challenges when it comes to PCI compliance. Read this white paper to learn the following:
How the standard relates to the AS/400
How to...
I was talking the other day with a friend who works at an information security risk company. He shared with me the higher-level details of a physical penetration test on which he tagged along.
The bottom line was getting new employees up to speed. That was the final selling point for People's United Bank to implement an identity access management solution. People's United Bank has implemented an identity access management solution that now automatically provisions 3,000 of its nearly 5,000 employees on the...
Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
Security is good for your customers - and that's good for your business. When you increase security of your online applications, you boost consumer confidence, loyalty, and sales. You also position your company to comply with current and emerging government regulations.
A new white paper from VeriSign spells out...
Over the past 10 years, a primary concern for financial institutions was securing the perimeter of your network from attack by anonymous hackers. Today, your perimeter is secure, and your next biggest threat is from within. How is this? Security gaps created by silos...
Today, financial institution employees...
The Federal Reserve Banks have 12 information security control deficiencies that must be improved, according to a new report from the U.S. Government Accountability Office (GAO).
On Monday, June 16, the GAO issued its annual audit report in connection with its requirement to audit the financial statements of the...
The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the discussion?
Not early enough, says Nalneesh Gaur of Diamond Management & Technology Consultants. In this interview,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.