As organizations move to the continuous monitoring of their IT systems to assure they're secure, they rely much more on automated processes. But don't forget the role people play.
Enforcement and class actions are what the year 2011 will be remembered for in privacy. So, how can pros prepare for the inevitability of a litigious and increased-enforcement environment?
Save Mart, the Calif.-based supermarket chain, offers new details and an FAQ about the investigation into the payments card breach that now is estimated to impact hundreds of customers and accounts.
Michaels, Save Mart and Subway. Each of these companies was victimized by point-of-sale fraud, and security experts say the fraudsters' patterns offer valuable security tips to merchants and financial institutions.
The Department of Justice has indicted four Romanians for their alleged roles in a multimillion-dollar fraud scheme believed to have compromised hundreds of U.S. merchants and more than 80,000 U.S. consumers.
Calif.-based grocer Save Mart confirms dozens of reports by employees and customers about account compromises linked to the merchant's recent breach. Are these incidents linked to a larger, organized crime ring?
A card compromise at a California-based grocery chain has raised questions about the efficacy of PCI-DSS. Experts say even if merchants are compliant, fraudsters can easily get around the security measures.
Retailers and fast-food chains throughout the world are reporting an uptick in point-of-sale skimming incidents. Why do fraudsters find retailers and restaurants so easy to target?
How did fraud specialists at Chase successfully thwart an alleged ATM skimming scheme that impacted 1,500 customers? The bank's fraud-detection efforts draw praise from Gartner's Avivah Litan.
Mobile banking is a 'must-have' today, but the foray into this new financial-services arena comes with risk. Consistent review and implementation of security layers and controls is the only strategic way to tackle emerging mobile offers.
Bank of America's Keith Gordon says securing the mobile channel is much like securing any other banking channel: Controlling risks requires layers of security and controls. But educating customers plays a key security function, too.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
When Mano Paul of (ISC)2 discusses today's top application security challenges, he draws an analogy with sharks. And what he views as the skills needed to tackle today's top threats might surprise you.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.