Containerization - it's the latest strategy for securing the critical data accessed by remote workers and mobile devices. How is the concept deployed? David Lingenfelter of Fiberlink offers insight.
Throughout 2013, security professionals will continue to face evolving mobile security challenges, says Javelin's Al Pascual, who, in a new report, analyzes the changing mobile threat landscape for the year.
The FFIEC has issued proposed risk management guidance for the use of social media. Find out about the key recommendations, and why experts say the guidance could prove valuable to banking institutions.
Banks have improved DDoS defenses, but ensuring ongoing online reliability requires a more offensive measure - one that rids the Internet of vulnerable sites that can too easily be used for bot traffic.
IBM's Dan Hauenstein, in analyzing Big Blue's 2012 Tech Trends Report, says security concerns often inhibit the adoption of four technologies: mobile, cloud, social business media and business analytics.
The answer seems obvious, especially in the context of IT security and information risk. Yet, is it, especially when developing codes and standards, as well as funding research and development initiatives that involve taxpayer money?
President Obama has proclaimed December as Critical Infrastructure Protection and Resilience Month, and is using that declaration to continue his campaign to get Congress to enact comprehensive cybersecurity legislation.
As social media continue to expand and evolve, organizations need to formalize a policy to address the risks. Expert Sherrie Madia details the must-haves that should be included in a policy.
Social media platforms are ever-evolving. But organizations' and individuals' use of social media has not evolved and may create new risks, says educator Sherrie Madia. How should we manage these risks?
Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
The biggest social media concern for risk managers is the potential reputational impact to the organization, says risk expert David Bradford, who outlines mitigation steps.
Infosec pros take note: As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say IBM's Rick Miller.
Making an appearance twice a year just to ask for additional budget will not cut it. The CISO needs to make sure the board members know that he or she is a true enabler of the business.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.