Removing provisions from the original bill to grant the federal government authority to impose standards on the mostly privately-owned critical IT infrastructure is a concession to win votes from Republicans, who oppose regulation.
BITS is ramping up its work with federal regulators around pending legislation. What initiatives is the group spearheading, and how can banking institutions play an integral role in the process?
A recent research report describes a so-called new financial fraud scheme dubbed "Operation High Roller". Although there is nothing in this report that was not previously covered in Trusteer's publications (Blog and white paper), the report received substantial press coverage and raised the awareness of the risks...
How an organization communicates in the wake of a major breach incident can play an important role in maintaining the organization's reputation and minimizing the financial impact.
But how can your organization avoid mismanaging post-breach communication and potentially wasting millions of dollars?
Join us for...
Many organizations realize they are at risk of insider attacks. But do they have evidence and capabilities to respond to these risks? That's the real challenge, says researcher Larry Ponemon.
"The Risk of Insider Fraud" is the name of new research conducted by Ponemon and Attachmate Luminet, and it sheds new light...
Every organization struggles with the concept of "telework." On one hand, you need to enable employees and contractors to work remotely. Yet, at the same time, IT organizations struggle to find a cost-effective way to securely support these workers.
Download this Osterman Research white paper for detailed cost...
High profile security breaches and the resilience of advanced persistent threats have clearly demonstrated why cyber security concerns have influenced the regulatory legislation governing all industries and why regulations are here to stay. This new white paper discusses the regulatory requirements governing data...
As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, reflecting specific risks and markets, these laws share common investigation requirements in...
While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, today's malware enables potent multistage attacks called advanced...
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
State Street Corp. scientist David Saul says most financial institutions have plenty of information, but are not doing enough to exploit the business benefits of so-called "big data."
A successful effort to build a corporate culture that values privacy should be built on ideas that come from the rank-and-file staff in all departments, says Jan Hillier, a specialist in managing change.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.