Each time we see a major data breach related to payment card data, the breached entity says 'Gee, well we were told we were PCI compliant - how could this happen?'
This one was almost predictable.
We were just days away from Aug. 1, the date after which the Federal Trade Commission (FTC) would start enforcing compliance with the Identity Theft Red Flags Rule.
Then came the announcement from the FTC that it's going to extend the deadline. Again.
It's become a Friday night ritual over the past year or so. Wait til 5 p.m., and then watch the clock to see how many after-hours bank failure notices come through from the FDIC or OCC.
If there's one thing I've learned about information security professionals, it's that they come in multiple flavors.
Yet, increasingly today, you want people who can run security like a business, feel comfortable in maintaining a seat at the table and are willing to work with changing governance
As I listened to Bernie Madoff get his prison sentence meted out to him by Judge Denny Chin, I felt some tinge of vindication. But not having been directly affected by the largest Ponzi scheme in history, I can't imagine what the more than 1,000 victims of his unprecedented crime felt at that same time.
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
The power of social networking web sites can be measured by just looking at the number of hits (or visits) to a person's web page on such well-known sites as MySpace or Facebook.
The negative side web users should consider before placing information on such social networking sites include the connection one...
Email security is an issue for businesses and agencies of all sizes. To tackle that challenge, BITS and eCert Inc. have just released a new paper entitled "Email Sender Authentication Deployment."
In an exclusive interview, Paul Smocer, VP of Security at BITS, discusses:
Top email security challenges facing...
Bank fraud has evolved over the last several years, but some classic variations keep financial institutions busy.
Here are six old fraud tricks that are back with new twists to bedevil fraud departments and information security professionals.
The fraud fight is getting nastier by the minute, say experts familiar with the new schemes - and some old ones with new wrinkles -- being perpetrated by criminals against financial institutions and their customers. Here are 13 of the most prevalent ruses.
OK, so today's the day.
After two months of anxious anticipation, today is May 19, the deadline Visa set for financial institutions to file fraud claims related to the Heartland Payment Systems (HPY) data breach.
So...now what?
OK, back home and back in the office fulltime after a couple of weeks on the road to California for the RSA Conference and a bit of R&R. Some observations as I clear my desk ...
I'd like to think we saved the best for last.
This past Friday, as the annual RSA Conference concluded, I presented the results of our annual Banking Information Security Today survey to a surprisingly packed house of banking/security leaders, regulators, consultants and vendors.
She did a Geithner.
In making her first public appearance since delivering her long-awaited cybersecurity review to President Obama last week, Melissa Hathaway took to the stage at the RSA Conference in San Francisco on Wednesday. And she did exactly what Treasury Secretary Timothy Geithner was criticized for when...
OK, so it's April 15, and everyone's mind turns to taxes and filing returns.
Me? I'm thinking of the pace of failed banking institutions we've seen so far this year - and wondering just how much we're taxing the FDIC's insurance fund.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.