From 2004 to 2010, Latesha Brown used her privileges to accept and submit forged birth certificates, pay stubs and other documents to obtain loans at several institutions. How did she go undetected for so long?
"You can't have someone arrested for violating your policies," says former Bear Stearns CISO Jennifer Bayuk. "The question is: What did he do, and was there a policy that would have prevented the activity?"
The financial system is in better shape than what it was in 2008 and 2009. But market volatility and regulatory reform could change everything, says former FDIC head William Isaac.
The Texas wildfires, which over the past seven days have consumed over 9,205 acres, are a wake-up call to financial institutions to review their business continuity and disaster recovery plans.
Intelligence expert Terry Roberts says cyber intelligence, a new approach to IT security, could make significant gains in the coming year. "The good thing is, this isn't really rocket science," says the chair of the Intelligence and National Security Alliance's Cyber Council.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
Most consumers understand the need for security on laptops and PCs. On mobile devices, the thinking is not the same. "Their behavior is much riskier," says Markus Jakobsson, online security expert.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
The key...
Nessa Feddis of the ABA says increased investments in technology at the bank and consumer levels have fueled confidence in online banking. "I think the reason you see an uptick in use here is because the channel is more secure."
File transfer protocol remains a practice within banking institutions of all sizes. But how can banking/security leaders ensure secure FTP that will protect and track critical data? These thought leaders offer strategies.
"Let's face it: Banking relies on a trust relationship," says Matt Speare of M&T Bank. "Any...
File transfer protocol remains a practice within banking institutions of all sizes. But how can banking/security leaders ensure secure FTP that will protect and track critical data? These thought leaders offer strategies.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
Government officials have confirmed a potential threat by al-Qaida against the United States as the nation approaches the 10th anniversary of the Sept.11, 2001 terrorist attacks that hit the World Trade Center and Pentagon.
Provisions in legislation introduced by Sen. Richard Blumenthal, D-Conn., target companies that store online data for more than 10,000 people to assure their customers' personally identifiable information is protected.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.