Brokers and insurers have upped their marketing efforts to get enterprises to purchase cyber insurance, even though policies could be risky for sellers and buyers. See 10 considerations you should mull before buying cyber insurance.
Georgia Tech Research Institute is beta testing a malware intelligence system that research scientist Chris Smoak contends will help corporate and government security officials share information about the attacks they confront.
Developing a culture of responsibility could go a long way in helping business, not-for-profits and governments secure their organizations' information resources.
IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.
Israel's intelligence agency supervises commercial banks' IT systems because they're considered part of the critical national infrastructure, and that's okay with the bankers. See why.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
A $1.5 million mortgage fraud scheme in Virginia shows that these complex scams continue to thrive. Why is this type of fraud so difficult to detect, and what can be done to prevent it?
How are banking institutions addressing mobile security risks and authentication challenges? Paul Smocer of BITS says some of the proactive steps banks are taking might surprise you.
Global Payments has been less than forthcoming with information about its data breach. How could this lack of transparency hurt the processor, and what's the lesson for others?
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
Security firm Imperva had the opportunity to watch a hacktivist attack play out. Learn what the three phases of the attack were and how it was stopped.
Gartner's Avivah Litan says banking institutions are spending resources on risk assessments. But what steps will they take next to conform to the FFIEC Authentication Guidance? Litan shares insights.
Are institutions making the right investments in anti-fraud technologies? As they conform to the FFIEC's updated Authentication Guidance, many could miss the mark, warns Aite's Shirley Inscoe.
Which security concerns should institutions be bracing for, as more consumers adopt mobile banking? BITS offers a collection of recommendations from some of the industry's top institutions.
BITS' new mobile research highlights six key areas of risk every banking institution must consider. Find out what security and fraud-mitigation strategies institutions should be implementing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.