An analysis of many recent studies suggests that over 80 percent of applications contain simple vulnerabilities. Here are five tips that developers can leverage to secure their code.
As we close out one year and begin another, we look back at IT security lessons that emerged over the past 12 months. Here are five that should resonate in the coming year.
"Banks and businesses have to realize: It's not a matter of 'if' when it comes to these attacks," says Barry Rich, CFO of Tennessee's CapitalMark Bank & Trust. "it's just a matter of when."
ACH/Wire fraud was the big story in 2010 and helped influence the updated FFIEC Authentication Guidance. So, have incidents of corporate account takeover decreased in 2011, or are we just hearing less about them?
When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a Web application were to blame. CISO Erik Avakian explains how the state developed a process to correct flaws in application code.
In their efforts to enforce security layers and multifactor authentication, are banks and credit unions still missing a core problem - the real vulnerabilities fraudsters are banking on?
When Liberty Bank began reviewing online risks to conform with the FFIEC Authentication Guidance, layered security came up as a weak spot. So how did this community institution address its risks?
According to court records, Sabrina Matache and her co-conspirators collected PINs with hidden pinhole cameras installed near compromised ATMs at People's United Bank branches in Connecticut.
Regulators push tougher cybersecurity measures. But the challenge for smaller organizations isn't compliance - it's budgets. Wendy Nather of 451 Research defines the 'Security Poverty Line' and what to do about it.
What's the connection between 14 Romanians and an alleged phishing scheme that involved 10 U.S. banks and their customers? A new, unsealed indictment outlines a massive fraud and ID theft conspiracy.
Enforcement and class actions are what the year 2011 will be remembered for in privacy. So, how can pros prepare for the inevitability of a litigious and increased-enforcement environment?
How prepared are most U.S. banks and credit unions are the first wave of exams since issuance of the FFIEC Authentication Guidance? Insights from industry experts might surprise you.
The scheme allegedly involved insiders recruited by fraudsters to steal information about more than 200 individuals and organizations. How can institutions improve background screening and prevent fraud?
A new survey identifies the Top 10 Cybersecurity Trends for financial service organizations. Malware and mobility head the list of risks to watch. What are the other key concerns?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.