The U.S. Federal Financial Institutions Examination Council has issued a resource document to help financial institutions better understand and address unique risks posed by outsourced cloud-based services.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
How are banks addressing mobile security risks? Bank of America's Keith Gordon says most are just beginning to forge ahead in the mobile space, and new security gaps are areas for which institutions have to prepare, proactively.
The CISO role is evolving. But for that role to be truly recognized throughout the organization, security professionals need to make some improvements. Read on to find out how to be an influential CISO.
A data scientist is a new breed of database professional who applies scientific analysis to large data sets to identify patterns and vulnerabilities. Here are five expert tips on how to qualify for the new role.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
A U.S. appeals court reversed a lower court's ruling in the ACH/wire fraud dispute between PATCO Construction Inc. and the former Ocean Bank, now People's United. What is next in this high-profile case?
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
Learning how alleged fraudsters hacked systems and traded in stolen credit- and debit-card numbers can help organizations take steps to protect their customers' and stakeholders' sensitive information.
The story on how the FBI built its case against Jarand Moen Romtveit in an international carding sting gives IT security practitioners valuable insights on how one individual works in the murky world of hacking.
In what is being called "the largest coordinated international law enforcement action in history directed at carding crimes," 24 suspects have been arrested in a fraud scheme likely involving more than 400,000 accounts.