The deadline of June 30th has come and gone, and thousands of companies have demonstrated that they are incapable of complying with a set of security guidelines to prevent data breaches and protect credit card data against identity theft. These security guidelines are from the Payment Card Industry (PCI).
When you think about the number of PIN numbers, passwords, or passphrases you use every day: getting money from the ATM or using your debit card in a store, logging on to your computer or email, signing in to an online bank account or shopping cart...the list seems to just keep getting longer.
The science fiction movies from the 1960s had talking computers that interacted with humans. That was considered a far-fatched idea in its time, but the current state of technology for voice biometrics and voice recognition has brought the standard up to a level where banks, including major international entities as...
In what is being described as a “wow†product in the growing line of multi factor authentication products being developed to meet increased regulation for stronger authentication, VeriSign Inc., announced its partnership with Innovative Card Technologies, Inc., the developer of the ICT DisplayCard, to...
Listen to this latest podcast on CUInfoSecurity.com. You'll hear Rhonda MaClean, former CISO of Bank of America's take on the following:
· The TJX data breach - these kinds of problems are not going away
· What's important about getting back to basics of information security
· Customers' trust in the...
The FDIC’s Information Technology Risk Management Program (IT-RMP), used by FDIC examiners in the examination process of financial institutions, will be looking more closely at the way financial institutions choose, oversee, and document their technology service providers and how those technology service...
As organizations continue to adopt hybrid and remote work models, employees are no longer working behind office firewalls. Access to highly sensitive data can now come from anywhere, on any device and on any network, even those not managed by the enterprise.
While Generative Artificial Intelligence offers incredible benefits for automation and efficiency, they also present unique security challenges. This blog looks at the most critical security risks to Large Language Models and how to protect against them.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.