By identifying abnormal data access behavior, machine learning systems could improve breach prevention and fraud detection in the healthcare arena and other sectors, contends artificial intelligence expert Robert Leithiser.
FBI Director James Comey's declaration that the Obama administration will not pursue legislation to require vendors to create a backdoor that would permit law enforcement to circumvent encryption on mobile devices isn't the end of the matter.
An international law enforcement operation - spearheaded by the U.S. FBI and U.K. National Crime Agency - has disrupted the notorious Dridex banking malware and phishing campaign, which has been tied to at least $40 million in losses worldwide.
The future of payments security hinges on a combination of factors, including widespread use of the EMV chip, tokenization and encryption, as well as near real-time payments, says Liz Garner, vice president of the Merchant Advisory Group, a featured speaker at ISMG's Fraud Summit New York on Oct. 20.
Dell's announcement that it plans to purchase storage maker EMC for a mind-boggling $67 billion does not make clear the fate of EMC's information security unit, RSA. Analysts believe Dell has not yet determined whether RSA fits into its long-term plans or should be sold or spun off.
Security researchers have demonstrated in a lab setting an information-stealing attack against Amazon Web Services users. But Amazon says its customers "using current software and following security best practices are not impacted by this situation."
Convenience store operators say they aren't going to be fully EMV compliant anytime soon - and it's not their fault. Learn what else they had to say about their security challenges at this week's NACS Show 2015 in Las Vegas.
An alert issued - and then yanked - by the FBI about fraud vulnerabilities linked to EMV chip cards is reigniting the debate between bankers and retailers over whether EMV in the U.S. should be chip-and-PIN or chip-and-signature.
Has authentication become too complex for banking institutions? That's a legitimate concern, says Peter Tapling of Early Warning. He offers strategies to simplify and unify authentication strategies.
Security leaders do well securing stored data and data in transit. But what about the integrity of data after it reaches the intended recipient? This is a huge gap to be bridged, says Chris Kniffin of Seclore.
The shift to the EMV standard in the U.S. has drawn incredible media attention for more than a year as everyone witnesses the approach of the looming liability shift deadline. But what does it really mean for merchants, consumers, and hackers? I say the answer is actually very little, and in as few words as possible,...
A cybercrime ring that employed the Angler Exploit Kit to earn an estimated $34 million per year - from ransomware infections alone - has been disrupted by security researchers at Cisco's Talos security intelligence and research group.
Security on the endpoint took a long time to move away from mere patching, hardening and anti-virus technologies. To fight advanced threats, experts say visibility on endpoints is being transformed by the advent of endpoint detection and response tools.
In this audio blog report, hear why former NSA Director Mike McConnell changed his view on the value of the government getting device manufacturers to create a backdoor to allow law enforcement to bypass encryption.
BitSight Technologies is out with its annual Industry Benchmark Report, and cybersecurity ratings are low for the energy and utilities industry. BitSight's Mike Woodward shares insights for all sectors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.