Today's advanced threats are no secret. Focusing the correct resources on them is the true challenge, says Will Irace of General Dynamics Fidelis Cybersecurity Solutions. He offers tips for harnessing the right skills and technology.
As organizations use social media to grow their online presence, questions of ownership become an increasing concern, says Alan Brill of Kroll, who advises organizations on how to mitigate risks.
Homeland Security Secretary Janet Napolitano has made official what's been known for two weeks: McAfee Vice President Phyllis Schneck will be the next deputy undersecretary for cybersecurity at DHS. She will start her job next month.
One of the biggest influences on Phyllis Schneck, the new Homeland Security deputy undersecretary for cybersecurity, is her father, Paul Schneck, an internationally accomplished computer scientist.
Version 3.0 of the PCI Data Security Standard is coming, and draft guidelines reflect the impact of recent retail breaches. PCI GM Bob Russo explains big changes to ensuring payment card security.
How relevant is customer education? Readers weigh in with thoughtful responses to two recent guest blogs that tackle the question from two perspectives: the education proponent and the critic.
At $1.5 million, it's one of the largest account takeover incidents on record. Attorneys review the Efficient Services Escrow case and ask who will be held responsible - the customer or the bank?
Bruce McConnell, who just stepped down as one of the federal government's top cybersecurity policymakers, says he understands why some lawmakers don't trust DHS with significant authority to safeguard government IT.
While organizations wait for possible cyberthreat intelligence sharing legislation, the community is proactively working to share valuable information among different industries, says MS-ISAC Chairman Will Pelgrin.
The old saw of a blind squirrel fortuitously finding an acorn reminds the Atlantic Council's Jason Healey of cyber-assailants from third-rate cyber-power Iran, believed to be behind DDoS attacks on U.S. banks.
Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
Moscow-based cyber-intelligence firm Group-IB is working with INTERPOL to monitor and track online criminals. The purpose: to take down botnets throughout the world.
It's time to start thinking about the next wave of DDoS attacks, says Neustar's Rodney Joffe. And it's time for other critical infrastructure industries - not just banks - to assess their risks.
As NIST continues to develop a cybersecurity framework that mostly private operators of the nation's critical infrastructure could voluntarily adopt, what are the key gaps that still need to be filled?
It's been three weeks since the start of Phase 4 DDoS attacks on banks. But so far the impact has been minor. Are attacks over or yet to come? Rodney Joffe and other DDoS experts share theories.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.