The most critical and often weakest link in ANY security program is the human element. This is true in data security, and as the events of Christmas day showed us, national security as well.
How prepared is the financial services industry in the event of a cyber attack?
The Financial Services Information Sharing and Analysis Center (FS-ISAC), a national industry forum, will conduct Cyber Attack Against Payment Processes (CAPP), an exercise to measure the ability of financial institutions, payment...
Earlier this week, I blogged on what have been the most popular interviews I've conducted in 2009 - and there have been a lot of them.
Today I'd like to talk about my favorite interviews of the year. And there have been a magnificent seven of those.
This is always a fun exercise.
I spent some time today looking back over all the articles we published (so far) in 2009.
And that number is 891, by the way - an average of just over 17 per week, or three-plus per weekday. But the number that concerned me most is 10 - what have been the top 10 most popular stories...
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
Tis the season, indeed.
As December starts, already I'm talking with thought-leaders about what the world of information security might look like in 2010.
Organizations and security controls have changed, so senior management and regulators now demanding more of internal auditors.
Beyond financial and control issues, internal auditors now are being asked to assess the effectiveness of an organization's enterprise risk management program, says Warren W. Stippich, Jr....
Los Alamos National Laboratory has spent $45 million to secure its classified computer network over seven years, according the GAO, yet significant weaknesses remain in safeguarding its classified computer network.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
One of the recurring topics at last week's BAI Retail Delivery Conference & Expo -- in almost all recent conversations about the banking industry, in fact - was social media.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.