Bob Carr, CEO of Heartland Payment Systems, contends that not enough progress has been made in improving payments security in the seven years since the processor experienced a massive breach. Find out why he argues that retailers and processors still have much more to do.
Many organizations spin their wheels when it comes to cybersecurity, says IBM's Andy Land. They invest in tools that do everything except what security leaders are fundamentally tasked with doing: Protect the data.
In the wake of the severe Stagefright flaw being discovered, numerous security-savvy experts say they now plan to ditch Android. Is it time for enterprises to start blocking unpatched Android devices?
Just two weeks after an international, FBI-led operation disrupted the notorious hacking forum Darkode, leading to 70 arrests, a supposed site administrator has claimed the forum will reboot on the "dark Web." But security experts question those claims.
RSA Conference Asia Pacific and Japan, which wrapped up last week, was a successful reflection of this region's hottest security topics. Here are some of my own observations, as well as feedback from the attendees.
Tools to build and manage the ZeusVM banking Trojan have been leaked online, meaning that both die-hard and would-be criminals alike can now try their hand at running botnets, for free.
Wipro has developed a fraud detection model for improved risk management using big data analytics. Can CISOs leverage it to reduce risk, enhance process efficiency and refine fraud detection algorithms?
During a time of significant change for corporations, when today's modern network extends far beyond the company's physical walls, it's disturbing that companies face such well-organized and pervasive threats.
Wanted: Hackers for hire. Or in British government parlance: "Committed and responsible individuals who have the potential to carry out computer network operations to keep the U.K. safe." Ready to apply?
Leaders and top practitioners from numerous federal government agencies will transplant themselves to San Francisco this coming week to share their knowledge on a wide range of topics at RSA Conference 2015.
Most organizations have yet to realize the cybersecurity benefits of big data analytics, says Russell Thomas of Zions Bank. He explains steps the pioneering bank is taking to revolutionize its big data operations.
Cybersecurity has been a priority of the Obama presidency from the get-go. But do all of his cybersecurity actions, unprecedented among American presidents, make him a cybersecurity leader?
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
The use of big data for real-time threat analysis will become more commonplace among banks and credit unions in 2015, says Bill Stewart of Booz Allen Hamilton, who describes cybersecurity trends for the year ahead.
At Information Security Media Group's Fraud Summit Dallas, security experts said banks should be bracing for a major overhaul of the payments infrastructure as emerging technologies hit the market.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.