Patent infringement lawsuits that involve security practices are becoming more common in heavily-regulated industries. Organizations need to take several steps to be well-prepared, advises patent attorney James Denaro.
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.
Distributed-denial-of-service attacks are perfect weapons for cybercriminals and political adversaries, says Prolexic's Scott Hammack, who explains why any organization with an online presence should brace itself for attacks.
So-called patent trolling is getting attention from banking leaders and the White House. As patent attorney James Denaro points out: "Essentially every single financial institution is at risk of being accused of infringement."
DDoS attacks on U.S. banks will continue, and community institutions may well be the next major targets. Rodney Joffe of Neustar offer tips for how smaller institutions can assess DDoS risks and improve DDoS mitigation.
In an interview about DDoS threats and defenses, Joffe discusses:
Why community banks must...
Reports of account takeover incidents have increased in the last 18 months, yet losses have remained steady, says former federal banking examiner Amy McHugh, who analyzes what security measures are working and what still needs to be done.
A new precedent in ACH and wire fraud liability could be set if Choice Escrow is successful in its appeal to have a lower court's ruling overturned. Legal experts explain why this could prove to be the new benchmark.
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.
The OCC's DDoS risk warnings to community banks may indicate more regulatory scrutiny is on the way. Banks should prepare for more oversight of their cyber-attack reporting and threat mitigation practices.