The rise in usage of mobile devices has also come with a commensurate rise in application risk. View this webinar to find out how to make mobile app security a priority and tame the chaos.
Leading today's RSA Conference 2014 industry news roundup, Thycotic announces RSA survey results, while Freescale Semiconductor announces support for software.
Cisco has launched a new open source initiative focused on application identification, says Scott Harrell, vice president of the company's security business group.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
The final version of the FFIEC's guidance on social media use clarifies how banks should assess consumer and third-party risks. But suggested controls for employee risks are still missing.
Hackers have pilfered some 2 million user passwords and credentials for Facebook and other social media and Internet sites, according to IT security provider Trustwave. The hackers attacked computers in about 100 nations.
Twitter's announcement that it's adding "forward secrecy" encryption to its sites should serve as a reminder that organizations need to continually assess the risks to their organization, experts say.
Figuring out how Edward Snowden breached NSA computers is sort of like solving a puzzle. Take public information and match it with an understanding of how organizations get hacked, and the pieces seem to fall into place.
FS-ISAC has issued a white paper with tips on streamlining third-party software risk assessments. One member of a new working group explains why the adoption of standard security controls is so critical.
Information Security Media Group is offering a growing list of fraud-fighting educational opportunities, including videos of presentations at its recent Fraud Summit plus a series of 2014 summits.
Senior leaders in business and government are buying in to the need for more cybersecurity investments as well as threat-intelligence sharing, new research shows. But why are they still struggling to hire the right security pros?
Reliable statistics to track trends in cybersecurity employment are scarce. But the available numbers offer some insights, including the relative strength of the IT security workforce.
Sharing information about cyber-attacks is making a difference in the banking sector, helping bring criminals to justice and curbing fraud losses. Other sectors should learn from banking's example.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.