The truth about preventing a breach, like the advanced-persistent-threat attack RSA experienced in 2011, is that an organization can't defend critical systems alone, says RSA CISO Eddie Schwartz.
How well do U.S. financial institutions conform to the FFIEC Authentication Guidance? One regulatory agency discusses the state of conformance and what its examiners have learned from institutions.
A successful organization in today's business world has most likely cultivated a "brand." Have you ever thought about creating your own brand to enhance your career?
A Mississippi bank is taking legal action against a former commercial customer, claiming the customer is liable for losses and damages linked to a suit over ACH/wire fraud.
Don't be too quick to write off the PATCO court ruling as a victory for banking customers in the debate over ACH/wire fraud liability. The reversal could actually be a win for banks.
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
How are banks addressing mobile security risks? Bank of America's Keith Gordon says most are just beginning to forge ahead in the mobile space, and new security gaps are areas for which institutions have to prepare, proactively.
A U.S. appeals court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, now People's United. What is next in this high-profile case?
Banking institutions are making significant anti-fraud investments as they work toward conformance with the FFIEC's updated Authentication Guidance. But are they investing in the right solutions?
Learning how alleged fraudsters hacked systems and traded in stolen credit- and debit-card numbers can help organizations take steps to protect their customers' and stakeholders' sensitive information.
For United Bank & Trust, cost, efficiency and customer adoption were big considerations when it came to FFIEC conformance. How did this $1 billion institution determine the best authentication option?
With the increasing amount of data being collected by organizations, the role of the data scientist has emerged to aid in analysis. What's unique about the role and what job functions does it entail?
"This is about preparing the battlefield for another type of covert action," a former high-ranking U.S. intelligence official says. "Cyber collection against the Iranian program is way further down the road than this."
The out-of-court settlement reached in a dispute between Village View Escrow and Professional Business Bank shows it's getting more difficult for banks to avoid liability, experts say.
Online banking attacks are up, but financial losses linked to account takeovers are down. What does this shift say about the future of fighting ACH/wire fraud? The FS-ISAC's Bill Nelson weighs in.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.