"As more channels connect to ACH, it will become the preferred route for banks to process transactions," says Steve Kenneally of the American Bankers Association.
Hemu Nigam says WikiLeaks founder Julian Assange has become akin to a "cyber messiah" And Assange's followers have proven: "If you turn your back on our messiah, we are going to take you down."
"Companies are increasingly looking for individuals who have a business mindset and can make the connections among security, IT risk and business," says John Reed, executive director of Robert Half Technology.
Understanding the contact versus contactless variables for an implementation of EMV in U.S. is the first step, says Smart Card Alliance's executive director.
"This seems to have been possible by the lack of a secure online banking environment provided by our former bank," says Jim Payne, Choice Escrow's manager of business development.
"With the right people, process and technology, you could be able to put a system together that would greatly reduce the impact these types of attacks have," says cybersecurity expert Eric Cole, a SANS Institute faculty fellow.
The House has joined the Senate in approving legislation that would exempt certain businesses, including physician practices and apparently many hospitals, from the Identity Theft Red Flags Rule.
Innovations emerging from the partnership will extend beyond financial services to other critical infrastructures, federal Cybersecurity Coordinator Howard Schmidt (pictured) and CTO Aneesh Chopra write in a blog.
Information security incidents are more sophisticated - and so are the criminals who perpetrate them. This raises the bar for professionals seeking careers in incident response in 2011.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.