From 2004 to 2010, Latesha Brown used her privileges to accept and submit forged birth certificates, pay stubs and other documents to obtain loans at several institutions. How did she go undetected for so long?
"You can't have someone arrested for violating your policies," says former Bear Stearns CISO Jennifer Bayuk. "The question is: What did he do, and was there a policy that would have prevented the activity?"
Payments are moving away from tangible currency to so-called new economies, where value relies more on reputation than currency. Venues such as Facebook facilitate e-commerce via new economies. But as with any change in the payments scheme, industry experts expect these new economies to be accompanied by new risks.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
Nessa Feddis of the ABA says increased investments in technology at the bank and consumer levels have fueled confidence in online banking. "I think the reason you see an uptick in use here is because the channel is more secure."
File transfer protocol remains a practice within banking institutions of all sizes. But how can banking/security leaders ensure secure FTP that will protect and track critical data? These thought leaders offer strategies.
"Let's face it: Banking relies on a trust relationship," says Matt Speare of M&T Bank. "Any...
The arrests of three Seattle-area men for their involvement in two separate ATM-skimming schemes highlight technological and social vulnerabilities that international fraudsters have learned to exploit with ease.