The demands of new regulations, including the Sarbanes-Oxley Act, Gramm-Leach-Bliley, the Patriot Act, and disclosure statutes for security breaches, are forcing banks to implement stringent information security measures. The auditing of information technology - once a rather staid component of a an auditing firm's...
Contracts perform a critical role in determining the value of a business relationship. For organizations managing large volumes of contracts, contract management software can help improve relationships with vendors and customers, decrease inflated costs, and ensure compliance.
Contract Lifecycle Management...
This publication is not from one of the Federal or State Banking Agencies, but given our extremely diverse audience, this will be of interest to organizations and individuals responsible for developing and maintaining security plans and programs.
The objective of system security planning is to improve protection of...
Nearly four out of five technology professionals believe employees are putting their companies at risk by failing to act safely online, according to new research.
In a study by anti-virus firm Sophos, 79% of the IT workers polled said that in spite of their group’s instructions, many employees continue to...
Recent and current pressures on IT security managers in publicly quoted companies to tick regulation boxes have about five more years to run. NetIQ security strategist Chris Pick believes that the discipline of risk management, taking companies beyond mere compliance, is "not there yet†as a driver of IT...
Some security practitioners react to new technologies with panic and the issuance of stern edicts against using USB drives/PDAs/EVDO cards/wireless LANs, etc. Stop and take a deep breath. In most cases, users have a legitimate need to fill. It is your job to find a way for them to fill that need safely, not to keep...
According to a Harris Interactive survey of U.S. office workers, 68% of employees have sent or received e-mails that could pose a risk to their company.
The survey shows that even if you think you’re e-mailing out a harmless joke, gossip, or innocent information about your company, you could be putting...
Determining if a candidate possesses the skills necessary to fill an information security position effectively before hiring him/her is not a trivial task. There are many methods one can use to gauge the effectiveness of a candidate's background.
It is important to note that for some positions, it might be very...
Andrew Miller- BankInfoSecurity.com Editor
The year 2005 will likely go down in history as the year of the data security breach. It was a year in which CardSystems Solutions Inc. revealed a security breach that exposed data on potentially more than 40 million payment-card accounts. DSW Shoe Warehouse disclosed the...
Omar Herrera
Information security personnel in Banks
Banks have specific requirements for the experience and abilities of their information security personnel. However, it is becoming harder for qualified professionals to satisfy requirements from these institutions.
While information security personnel can be...
"Botnet" Investigation Led by U.S. Secret Service’s Electronic Crimes Task Force and the Computer
Hacking and Intellectual Property Unit of the U.S. Attorney’s Office
SAN JOSE – United States Attorney Kevin V. Ryan announced that Anthony Scott Clark, 21, of Beaverton, Oregon, pleaded guilty...
The United States Attorney for the Northern District of California announced that Suibin Zhang, 37, of San Jose, California, was charged late yesterday by a federal grand jury in San Jose in a nine-count indictment alleging computer fraud; theft and unauthorized downloading of trade secrets; and the unauthorized...
Caused As Much As $20 Million in Losses to Software Industry
WASHINGTON, D.C.—The owner of one of the largest for-profit software piracy websites to operate in the United States has pleaded guilty to operating a software piracy website, Assistant Attorney General Alice S. Fisher for the Justice Department's...
Marcia Wilson- BankInfoSecurity.com Editor
In the year 2005, there were over 53 million individuals affected by security breaches wherein their personal information was compromised. The ChoicePoint incident was considered one of the first highly publicized events where notification to the individuals affected was...
Pete Boergermann - BankInfoSecurity.com Contributor Gone are the days when we could just throw a hub on a closet shelf, run a few network cables, connect some PCs and a server to it and have a network. Logs? What logs? Why would we want to look at them? Times have changed and most devices connected to your network...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.