To help prevent breaches, mobile devices should be encrypted even if storage of sensitive information on them is prohibited, says security expert Melodi Mosley Gates.
A breach is a disaster, says business continuity specialist Ken Schroeder. So organizing an effective breach-response team does not require a reinvention of the wheel. What it does require is a holistic approach.
Global organizations easily can be confused by the myriad privacy laws in different regions of the world. But U.S. privacy attorney Miriam Wugmeister has advice to help navigate these tricky waters.
Wells Fargo & Co. may have committed an inadvertent data breach when it responded to subpoenas requesting financial information about some of its customers. What happened, and who is impacted?
As U.S. banking institutions work to conform with the FFIEC Authentication Guidance, are they now doing better jobs of detecting and preventing incidents of ACH and wire fraud?
Outrageous Facebook behavior by a contractor at a California hospital offers an eye-opening reminder about the need for a zero-tolerance policy when it comes to privacy violations.
Save Mart, the Modesto, Calif.-based grocery chain, now confirms that skimming devices are to blame for the data breach believed to have exposed hundreds of consumer accounts to debit and credit card fraud.
An analysis of many recent studies suggests that over 80 percent of applications contain simple vulnerabilities. Here are five tips that developers can leverage to secure their code.
As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
Edward DeMarco Jr. of the Risk Management Association understands the regulatory challenges financial institutions will face in 2012. But to overcome those hurdles, improved communication is needed across the enterprise.
Breaches have an adverse impact on the fundamental operations of a business or government and without fully understanding that, executives and managers cannot smartly run their operations successfully.
The key message from the recent court ruling on the Hannaford data breach: You don't have to suffer fraud to be a victim. Attorney Ronald Raether explains what this decision means for future breaches.
Enforcement and class actions are what the year 2011 will be remembered for in privacy. So, how can pros prepare for the inevitability of a litigious and increased-enforcement environment?
The information security job market is evolving into highly specialized areas, says Eugene Spafford, noted professor at Purdue University. So, how must students now prepare themselves for these new career paths?
Having a breach response team in place at your organization is a necessity in today's threat environment. But how - before a breach occurs - do you know if your team is truly effective?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.