The National Institute of Standards and Technology issues a revision to the digital standard used to ensure the integrity of electronic documents and the identity of the signer.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
Harbor Freight Tools, a 400-store retail chain, is reporting a cyber-attack against its payment processing system. The breach is the latest involving compromised merchant processing systems that one security analyst says proves payments systems are "fundamentally insecure."
What are the emerging security vulnerabilities for mobile devices? Anti-phishing expert Dave Jevans provides insights based on new mobile threat research.
Izz ad-Din al-Qassam Cyber Fighters says more DDoS attacks against U.S. banks are on the way. This fourth campaign will be "a bit different," the group says. Learn what experts expect.
Organizations increasingly engage with customers via social media, but managers often fail to incorporate or enforce key policies. Attorney David Adler offers tips to improve social media management.
As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Frustration over the growing number of retail breaches is heating up. See what our readers had to say after the malware attack that hit MAPCO Express, and why they believe PCI compliance isn't enough to ensure security.
Organizations could choose to add iris images as an alternate biometric over fingerprints on personal identity verification cards, because, for some users, fingerprint collection can be difficult.
Preliminary results of the 2013 Faces of Fraud Survey show institutions are still suffering big financial losses linked to ACH and wire fraud. Why are they still getting hit, in spite of investments to detect and prevent account takeover?
It's been two years since the FFIEC issued updated guidance for online-banking transactions. But how effective have banks' conformance strategies actually been at curbing fraud? Experts weigh in.
Securing mobile devices in the enterprise is just half the challenge. The other is ensuring that employees are able to work productively. A panel of experts from Attachmate offers new strategies.
Phishing schemes, particularly those aimed at the mobile channel, are growing. Daniel Cohen of RSA explains why we're no closer to solving the phishing problem.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.