An insurer has dropped its lawsuit aimed at avoiding covering damages suffered in the Schnucks retail breach. But attorney Dan Mitchell says this case shows why more companies need cyber-insurance.
The partial government shutdown caused NIST to miss the deadline for publishing a preliminary version of the cybersecurity framework, but the agency expects to meet the February deadline for releasing the final version.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.
Gen. Keith Alexander's departure from the National Security Agency has nothing to do with leaks by former contractor Edward Snowden about top-secret U.S. government programs to amass telephone and Internet records of Americans, an NSA spokeswoman says.
The average insider scheme lasts 32 months before it's detected, says threat researcher Jason Clark, who suggests using a combination of the right technologies and the right processes is the key to improving detection.
In the next five years, the federal government will work to centralize for civilian agencies' networks a way of identifying cyberflaws and employing diagnostic tools to remediate them, the Department of Homeland Security's John Streufert says.
A $400,000 settlement in a case against a community bank in North Carolina for violations of the Bank Secrecy Act should serve as a reminder that anti-money-laundering woes are not just a big-bank issue, experts say.
More than two-thirds of IT security specialists working for the U.S. federal government say their agencies are ill-prepared to adequately defend their IT systems, a new survey reveals.
Our inaugural Fraud Summit on Oct. 22 at the Meadowlands in New Jersey will feature an impressive lineup of information security leaders offering timely insights about practical risk mitigation strategies.
IT systems shuttered during the partial government shutdown are more vulnerable than usual to cyber-attacks as they're restored, security experts familiar with government IT systems say.
Fraudsters are using DDoS to distract banks during account takeover attempts, says fraud prevention expert Avivah Litan, who highlights DDoS trends to watch in 2014 and reviews how attack techniques have evolved in the last year.
A low-tech card fraud scheme, which involves covering merchants' satellite dishes with aluminum foil, proves blocking payment transmissions can be just as damaging as intercepting them.
Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
Although skimming attacks are still the greatest ATM fraud concern, experts warn that a new malware strain that targeted ATMs in Mexico may signal a shift and raises questions about software and operating system vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.