The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Archiving is the long-term storage of information in a repository, usually compressed to reduce storage space. Archiving information helps reduce data loss, as it ensures that everything will never get lost and can always be accessed. Top priorities all in this era of e-discovery and computer forensics.
With the heightened demands of regulatory compliance and e-discovery, managed message security and archiving is a huge challenge for financial institutions. Read this interview for expert advice from Lee Rothman, Sales Engineer at MessageLabs Inc., on archiving, including:
Today's top challenges;
How other...
Security Strategies from Lee Rothman of MessageLabs
With the heightened demands of regulatory compliance and e-discovery, managed message security and archiving is a huge challenge for financial institutions. Listen to this interview for expert advice from Lee Rothman, Sales Engineer at MessageLabs Inc., on...
It's a project that really represents about a year's worth of work and organization on our part, and on yours too. We started months ago. Information Security Media Group just started to visualize this project, the issues that we wanted to talk about - knowing the regulatory issues that were coming down, things that...
It's well-known that network communication is susceptible to eavesdropping and packet sniffing software looking for sensitive information. To avoid these traps, there are secure methods for communicating in the workplace between employees and outside of the company network.
Featuring Elan Winkler, Director of Messaging Product Marketing, Secure Computing
Listen to this interview for insights on how to create a "culture of compliance", building the right systems, processes and skills to solidify your regulatory compliance program today - and for the future.
Among the topics...
Feel like you're canned in by the spam emails in your inbox? Don't despair, here are some common sense tips to help stop spam from getting to your email inbox.
The Federal Trade Commission’s second summit on Spam in the last four years addressed the growing problem of unsolicited emails that is creating costs for businesses and consumers alike.
FTC Chairman Deborah Platt Majoras addressed the summit held July 11-12 in Washington, D.C. “The volume of spam...
As an employee at your institution, you’re a cog in the great wheel that makes everything run. You’ve got responsibilities and work hard to answer all inquiries and requests that come over your desk. A major portion of your work is done on a computer, over the email system your institution gave you...
Malicious code is not always hidden in web page scripts or unusual file formats. Attackers may corrupt types of files that you would recognize and typically consider safe, so you should take precautions when opening files from other people.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.