Security teams struggling to detect signs of threats hidden in mountains of data are attracted to big data analytics. But experts advise security professionals to take an incremental approach, starting out with smaller projects.
Although skimming attacks are still the greatest ATM fraud concern, experts warn that a new malware strain that targeted ATMs in Mexico may signal a shift and raises questions about software and operating system vulnerabilities.
An ENISA white paper provides guidance on securing industrial control systems and preparing an incident response plan. Learn why these systems, used in many sectors to perform repetitive automated tasks, are vulnerable to attack.
Open enrollment season for Obamacare as well as employer-offered health insurance is prime time for phishing scams, so it's urgent to remind consumers about the risks, security experts say.
Organizations should make sure their business continuity plans address all key business processes and customer-facing applications, says Dan Shannon of core processor Fidelity Information Services.
Vermont's $30,000 settlement with a breached retailer proves states can play an important role in holding retailers more accountable for losses associated with card fraud, and issuers should take notice, one banker says.
Russian authorities have reportedly arrested a man believed to be the author of the Blackhole exploit kit, widely used by cybercriminals to exploit vulnerabilities in Web browsers and other software to infect user computers with malware.
Despite the recent lull in al-Qassam Cyber Fighters' DDoS attacks against U.S. banks, the ABA's Doug Johnson and FS-ISAC's Bill Nelson warn banks to avoid complacency, noting that DDoS attacks pose an ongoing threat.
The FFIEC has warned banking institutions to take steps now to avoid security and operational risks associated with Microsoft's plans to discontinue support of Windows XP. Experts explain why replacing the operating system is critical.
Communication is key in the wake of a cyber-attack, says Dennis Simmons of SWACHA, who explains how simulated attack drills will help banks overcome their information sharing challenges.
The United States should be prepared for a dramatic increase in card-not-present fraud as cards using the EMV standard are widely deployed, says card fraud prevention expert Julie Conroy of Aite, who describes the reasons why.
Randy Trzeciak and his CERT Insider Threat Center colleagues are working to broaden the definition of the insider threat to incorporate not just the risk to information and IT but to facilities and people, too.
Adobe is notifying 2.9 million customers that their personal information has been compromised as a result of a breach into the software company's network. Source code for numerous products was also illegally accessed.
Don't think of cybersecurity as a profession; consider it as a field, says workplace expert Diana Burley. Yet, she says, some occupations within the cybersecurity field could be deemed professions.
Cybersecurity experts say perceived disruptions caused by the shutdown could encourage America's cyber-adversaries to increase their attacks and probes on federal government IT systems and networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.