Some of the most-connected people in D.C.'s cybersecurity community never heard of Michael Daniel, who will succeed Howard Schmidt when he retires as White House cybersecurity coordinator. Here's the skinny on Daniel.
A $1.5 million mortgage fraud scheme in Virginia shows that these complex scams continue to thrive. Why is this type of fraud so difficult to detect, and what can be done to prevent it?
How are banking institutions addressing mobile security risks and authentication challenges? Paul Smocer of BITS says some of the proactive steps banks are taking might surprise you.
"You need to educate people, and you need to have the right control procedures in place to ensure that people are aware of insider fraud," says Larry Ponemon, offering tips to reduce insider risks.
In an interview about the insider threat, Ponemon discusses:
Key findings from this new research;
What needs to be...
Banking regulators and law enforcement are collaborating to reduce losses linked to account takeover fraud. They say employee training at the branch level is a critical piece in the fraud fight. Why?
Michael Daniel, who as chief of the White House budget office's intelligence branch has extensive background in IT security, will replace Schmidt as cybersecurity coordinator.
We began speaking with Howard Schmidt years before anyone heard the term cybersecurity coordinator. Here are links to key interviews with Schmidt, who's retiring from that post at month's end.
A U.S. District Court has sentenced the last key figure from 2009's Operation Phish Phry, a two-year international cybercrime investigation that resulted in the arrest of 100 fraudsters on two continents.
New alerts from Visa and MasterCard suggest the breach at Global Payments dates to January 2011, an exposure window significantly longer than originally reported. What are the implications for card issuers?
How much card fraud can issuers link to the breach at Global Payments? Some sources suggest as many as 7 million payment cards may have been exposed, but how can they be so sure?
Supply chain risks can occur when organizations purchase and implement information and communications technology products and services. See 10 ways to diminish these risks.
Check fraud risk may seem minor, relative to threats posed by emerging e-commerce channels. But the lines between checks and e-payments are blurring. What can institutions do to mitigate the threats?
Security firm Imperva had the opportunity to watch a hacktivist attack play out. Learn what the three phases of the attack were and how it was stopped.
Gartner's Avivah Litan says banking institutions are spending resources on risk assessments. But what steps will they take next to conform to the FFIEC Authentication Guidance? Litan shares insights.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.