Texas attorney Richard Coffman was the first to file a class action suit against Heartland Payment Systems (HPY) after its data breach was announced publicly this past January.
In an exclusive interview, Coffman discusses:
The status of legal actions against Heartland;
What's unique about the Heartland case;...
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
Data and privacy protection - there's much that government, industry and consumers alike can do to improve information security. And the Federal Trade Commission (FTC) is at the heart of education and enforcement efforts.
In an exclusive interview, the FTC's Joel Winston discusses:
Top privacy risks facing...
In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...
Identity and Access Management (IAM) - it's a challenge for banking institutions of all sizes. And with institutions continually merging, acquiring and establishing new partnerships, the IAM challenge is only growing.
In an exclusive interview, Jay Arya, 1st VP of Information Security at Investors Savings Bank,...
Doug Brown Discusses Mobile Strategy, New Products, Biometric Security
Bank of America was one of the first institutions to move toward mobile banking in a big way. Two years into the initiative, Doug Brown, SVPO of Mobile Product Development, discusses:
Mobile trends at BoA;
Security hurdles the institution...
Vendor management was one of the hot regulatory topics going into 2009, and it's only gotten hotter as the year has unfolded.
James Christiansen, a longtime financial services/security leader and currently CEO of Evantix, discusses:
Vendor management trends at financial institutions;
How the Heartland breach...
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
Steve Katz was the world's first CISO, and he has unique insight on the information security profession - how it's developed and where it's headed.
In an exclusive interview, Katz discusses:
How the information security role has evolved;
Which trends are changing the role;
The skillsets necessary for today's...
According to the 2009 Banking Information Security Today survey, banking institutions - despite the economy - are investing in new banking services, i.e. mobile banking and remote capture.
To gain further insight into spending trends, we spoke with Christine Barry, research director with Aite Group, on:
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations.
Do you want to explain to your customers how you lost control of their personal financial...
There are more opportunities than ever for skilled information security professionals.
This is the belief of Gerald Masson, Director of Johns Hopkins University Information Security Institute, and in an exclusive interview he discusses:
Job prospects for information security professionals in the public and...