Mobile banking, Web 2.0, remote check capture - they're among the emerging technologies that appeal most to banking institutions. The key driver: the chance to offer more services to customers, and also cut costs through the further automation of banking transactions.
We recently spoke with leaders of the top...
We've known for roughly six months now that the Identity Theft Red Flags Rule compliance deadline is Nov. 1, barely four months away. How close, then, are banking institutions to meeting that deadline?
That is the question of the summer, and the answer will be found in the results of our new Identity Theft Red...
I started scoping out my next blog entry with PCI in mind (and how it will likely find its way into the community-bank/credit union space in a few years) and was blind-sided by one of my favorite nits to pick recently: the risks presented by poorly managed third-party vendor relationships.
By now we've all heard the buzz term "Web 2.0" - but how many of you truly grasp what it means?
For some time, even those entrenched in Internet marketing and technologies struggled to define the term (brings to mind "GRC"), and nowadays it seems more appropriate to describe web 2.0 by giving examples of specific...
Life on the Great Plains for many nomadic Indian tribes was built around the buffalo. The tribes followed the herds of great shaggy beasts across the rolling hills of tall grass, their entire lifecycle centered on the buffalo herd. Braves honed their lance and bow and arrow skills with hours of practice. A common...
Finally, it's your turn to have your say.
Since first joining Information Security Media Group late last summer, one of my primary goals has been to debut a blog for BankInfoSecurity.com and CUinfoSecurity.com.
Today, proudly, I'm able to announce the launch of not just one blog, but five - with more to come in...
Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
With all due respect to the pugilist fan base still out there, the FDIC used a classic left-right combo this past week aimed squarely at the jaw of the third-party service provider community.
First Sheila C. Bair, the Chairman of the FDIC, touched on emerging guidance regarding third-party service providers in
The OCC recently issued a bulletin (2008-16) in which it targets application security and the need for banking institutions to properly address application security "whether internally developed, vendor-acquired, or contracted for." I for one am relieved.
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
In case you missed it - because it wasn't a huge headline anywhere - here's a bit of news about First Pryority Bank, a 108-year-old community bank based in Pryor, OK.
Well, first a bit of background. First Pryority was founded in 1900 by W.A. Graham,
Arizona Central Credit Union of Phoenix, AZ., was hit with a phishing attack via text message to its members in March. While the attack was distributed on a small scale and didn't have much impact, the incident did roust the credit union staff into quick action.
Sadly, such incidents are a familiar...
One midwestern credit union (which prefers to remain anonymous), with nearly $200 million in assets and more than 30,000 members, has been phished four times -- the most recent in 2006, with three of those incidents occurring within a 90-day period.
So what do you do if your financial institution's brand is...
Risk management and the insider threat.
These are the two dominant themes emerging from the conversations and presentations at the RSA Conference in San Francisco this week.
From the keynote stage to the expo floor, with stops in between at the program sessions, information security experts, vendors and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.