As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, reflecting specific risks and markets, these laws share common investigation requirements in...
While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, today's malware enables potent multistage attacks called advanced...
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
State Street Corp. scientist David Saul says most financial institutions have plenty of information, but are not doing enough to exploit the business benefits of so-called "big data."
A successful effort to build a corporate culture that values privacy should be built on ideas that come from the rank-and-file staff in all departments, says Jan Hillier, a specialist in managing change.
In healthcare, financial services and other sectors, information breaches are an epidemic. More than 400 major healthcare breaches have been reported since late 2009. And headline-grabbing breaches in the financial services sector, such as the Sony and Global Payments incidents, illustrate why preventing breaches -...
How well do government agencies secure printing and imaging assets?
A new survey by Information Security Media Group and HP shows a significant disconnect between what agencies say about print security .. and what they are actually doing to ensure it.
To learn more about the state of print security at U.S....
FTC settlement agreements in two cases involving data exposed on peer-to-peer networks offer a reminder of the risks involved in using the networks. Social Security numbers, healthcare information and other personal details were exposed.
The online dating website eHarmony has warned a "small fraction" of its users of a June 6 breach that likely exposed hashed passwords. Whether the incident is related to a LinkedIn breach has not been confirmed.
In response to Congress' request for additional information, the Federal Retirement Thrift Investment Board has changed its story about how it found out about a July 2011 breach affecting its Thrift Savings Plan.
Mobile security threats can be managed through testing and strategic risk-mitigation strategies, says Keith Gordon, who oversees authentication and security strategies for Bank of America's consumer online and mobile banking units.
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.