A new audit that uncovered numerous problems with the U.S. Secret Service's IT management is "alarming," says House Oversight Chairman Jason Chaffetz, a victim of a Secret Service insider breach.
An NSA contractor who worked for Booz Allen Hamilton has been accused of stealing top-secret documents that the U.S. says could endanger national security. The documents are critical to a "wide variety of national security issues," the Department of Justice says.
Bank watchdog Sen. Elizabeth Warren is going after Wells Fargo for violating the privacy of bank customers. This news leads the latest edition of the ISMG Security Report.
Wells Fargo will pay $185 million in fines over employees illegally subscribing customers to banking products they didn't request - creating 2 million ghost accounts in the process - in what appears to be one of the largest cases of identity theft ever recorded.
A former administrative worker at a Florida pediatric practice has been indicted in federal court along with two others for alleged identity theft and fraud crimes involving stolen patient information. But why didn't prosecutors file HIPAA-related criminal charges?
A spate of high-profile, high-impact cyber breaches at several of the largest financial institutions in the United States has brought attention to a point that cybersecurity professionals have long taken as an article of faith: boards of directors need to take an active role in the management of cyber risk.
Yet,...
Bank of the West's new approach to the insider threat is focused less on detection, more on preventing fraud in the first place. David Pollino tells why a "noisy" insider fraud program is more effective than covertly monitoring employee activity.
The insider threat is a dangerous risk to government agencies and their most sensitive data. Monitoring the behaviors internally and identifying corrupt situations based on access, roles and actions is not a luxury government agencies can afford to go without.
Read our detailed white paper on building a case to...
The term Insider Threat brings to mind the malicious employee, motivated by either money or politics to steal data that can be sold on a black market or used to damage the organization's reputation.
According to a Ponemon report, unintentional employee negligence severely diminishes the productivity of the...
When desktops ruled the enterprise, employers may not have claimed to have absolute control over their workers' usage of technology and data, but they surely could contain it. Whether overtly or tacitly, leadership has now empowered its employees. Thanks to mobility, the cloud and other advancements, workers decide...
As a technology professional, you know that data, network and system failures aren't your biggest problems. It's the humans who interact with these systems that cause the issues.
High-risk insider threats - malicious, careless or negligent employees - are one of the main causes of data breaches. Most of the time,...
What are the biggest threats to your organization's data? Recent media attention to high-profile cyberattacks would lead an organization to think external threats are its only concern. Unfortunately, this misconception allows another significant threat to your organization's critical assets to stay completely under...
In what's being dubbed as the largest coordinated takedown to date, federal authorities have arrested 301 individuals for participating in Medicare and Medicaid fraud schemes involving $900 million in false billings.
The $1 million penalty that the SEC imposed on Morgan Stanley for its failure to prevent a former employee from compromising 730,000 client accounts is too low to send a strong message to financial services firms about the need for stronger cybersecurity and internal fraud controls, security experts say.
Close on the heels of the QNB leak, the same attackers have published data that appears to be from UAE-based InvestBank. The dump appears to contain payment card data, as well as a large number of sensitive, internal files relating to the bank's employees and systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.