C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Insider fraud;
Application security;
Cloud computing.
Axelrod is currently executive advisor for the Financial...
It's been almost a year since the Financial Crimes Enforcement Network (FinCEN) issued its red flag advisory about foreclosure scams. Now it looks like the agency sees another spike in mortgage modification scams hitting the U.S.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
The most critical and often weakest link in ANY security program is the human element. This is true in data security, and as the events of Christmas day showed us, national security as well.
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
So, did anyone read about the President's Cybersecurity Action Plan? I'm assuming you've read through all 10 points. You didn't stop to ponder after the first few did you? I mean, you didn't happen to stop after number 8? The one about the incident response plan?
OK, back home and back in the office fulltime after a couple of weeks on the road to California for the RSA Conference and a bit of R&R. Some observations as I clear my desk ...
The first federal CTO thinks the new federal CTO also could serve as the federal cybersecurity czar.
Norm Lorentz served as the federal chief technology officer in 2002 and 2003, working within the White House Office of Management and Budget. In that job, Lorentz focused on developing the federal IT enterprise...
Spring time in Washington D.C. used to be marked by the pink and white splashes of color of the cherry trees that line the Potomac and the Tidal basin.
Now I suspect this spring (or possibly even sooner) we're going to see some color of a different kind in D.C. - the color red.
I had an interesting email from a colleague the other day. Turns out someone he knows had recommended that he read a post of mine from January in which I discuss the value (or lack thereof) of having controls in place that don't function. He wanted to let me know about the reach of BIS and let me know that our...
Times are tough, and we all continue to hear about the heightened risk of the insider threat. Granted, unauthorized insider access to data has always been a concern. But the concern is increased now because of the tremendous changes that we are seeing in the economy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.