Big data isn't about size, says Gartner's Neil MacDonald. It's much bigger: Big data is about volume, velocity, variety and complexity, and requires new approaches on how information is used to secure digital assets.
Developing a culture of responsibility could go a long way in helping business, not-for-profits and governments secure their organizations' information resources.
Four recent breach incidents, including one affecting LinkedIn, have put the spotlight on the effectiveness of hashing. Why is hashing increasingly ineffective at protecting online passwords?
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
LinkedIn, the social network that's investigating the pilfering of nearly 6.5 million of its members' passwords, has neither a chief information officer nor chief information security officer.
Restaurant chain Penn Station's transparent response to a card breach that hit 65 of its locations provides an example of the right way to handle post-breach communications.
Consumers want more control when it comes to ensuring security during mobile banking. But most financial institutions have been reluctant to give end-users too much control. Why? Javelin's Jim Van Dyke offers some answers.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
An attorney, mortgage broker, loan processor and loan originator have been indicted for the roles they allegedly played in a fraud scheme involving at least 35 mortgage loans worth more than $16.2 million.
With an increase in state-sponsored hacking, Google says it will alert a select subset of its Gmail e-mail users when it believes their accounts may have been targeted.
LinkedIn has confirmed that a breach of its network compromised hashed passwords associated with accounts. Security experts speculate that e-mail addresses also could be vulnerable.
Mobile security threats can be managed through testing and strategic risk-mitigation strategies, says Keith Gordon, who oversees authentication and security strategies for Bank of America's consumer online and mobile banking units.
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
The '.bank' domain for websites could soon be available to financial institutions. But what are the potential benefits? Learn about four ways that the new domain could help enhance security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.