Nearly one year after the announcement of the biggest known data breach ever reported, the international hacker behind the crime pled guilty and will be sentenced in March.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Regulatory requirements can become a burden and paperwork drill. Regulatory compliance does not always mean more secure systems. We are fighting a cyberwar and need to focus our efforts and attention. Well-managed systems are inherently more secure systems. Focus on the "Top 20 Critical Controls" and hear how...
If you thought 2009 was a tough year in terms of regulatory scrutiny, wait until 2010.
With regulatory reform and consumer protection high on the agenda, financial institutions should face new pressures on several fronts, say industry observers.
Here are the top regulatory issues for banking institutions to...
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
Was Citibank breached by hackers who siphoned tens of millions of dollars from the bank's customers?
The Wall Street Journal on Tuesday reported news of an FBI investigation into an alleged Citibank computer security breach by hackers linked to a Russian cyber gang.
Citigroup executives, however, categorically...
It's been over one year now since banking regulators began examining institutions for compliance with the Identity Theft Red Flags Rule. What have been the common deficiencies, and what will examiners be expecting in year two?
Jeff Kopchik, senior policy analyst with the Federal Deposit Insurance Corporation...
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Seven banks were closed by state and federal regulators on Friday, Dec. 18, including four institutions of more than $1 billion in assets under management. The largest of the failures was First Federal Bank of California, a $6.1 billion bank, which subsequently was taken over by OneWest Bank of Pasadena, CA.
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
When it comes to protecting their customers' identities, how do the major banking institutions rate?
Javelin Strategy & Research has just released a new Banking Identity Safety Scorecard that ranks the major institutions. In an exclusive interview about the report, James Van Dyke discusses:
How the scorecard was...
While most people are planning time off from work over the holidays, criminals are working overtime this season on new scams to steal personal data.
The latest fraud schemes come from Connecticut, Hawaii and Oklahoma.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.