Looking ahead to 2009, banking/security guru Steve Katz quotes the ancient proverb: "May you live in interesting times."
With a new administration, new banking landscape and regulatory changes expected, we live in interesting times, indeed.
What better time to be discussing identity theft?
It's Cyber Monday today - the day designated as the official start of the online holiday shopping season - and if we've learned anything in recent weeks, it's that tough economic times heighten the risk of crimes such as identity theft. So, now is a great time to...
The annual BAI Retail Delivery Conference & Expo was held in Orlando, Fl in late November, focusing on innovative strategies and technologies.
Nick Burke, Director of Sales for Information Security Media Group (ISMG), publisher of BankInfoSecurity.com and CUinfoSecurity.com, attended the event, meeting with many of...
At a time when resources are tight and risks are abundant, many banking institutions are going mobile.
This is one of the findings of the recent Banking Confidence Survey, wherein 41% of respondents say their immediate business objectives include investment in new and enhanced services such as mobile banking. Their...
The crime of deception is now even more deceptive.
Multi-channel fraud - schemes that are launched simultaneously via telephone, Internet, in person and via mail - is a growing concern for financial institutions. And the linked crimes aren't always easy to spot.
In this exclusive interview, security expert Diana...
Despite economic setbacks this year, data security remains top-of-mind for the majority of community bankers.
Results from the 2008 Independent Community Bankers of America's (ICBA) Community Bank Technology Survey reveal that more than 80 percent of respondents are "vigorously maintaining data security" as their top...
Insights on the Federal Rescue Plan - an Interview with Guillermo Kopp of TowerGroup
Tuesday's news was mainly about Wall Street, with the U.S. government pledging to invest up to $125 billion in nine of the nation's largest banks.
But Main Street banking institutions and their customers will be the ultimate...
Howard Schmidt, a recognized information security thought leader, offers exclusive insights as new president of the Information Security Forum.
Schmidt, a household name in information security circles since his days as CISO and information security leader at Microsoft and eBay, discusses the global war against...
Leading Technology Vendor Discusses the Need for Vulnerability Assessments & Remediation Processes for Applications Whether Developed In-House or By a Third-Party
Application security is a key focus of regulatory agencies - ensuring that financial institutions pay as much attention to third-party applications as...
A recent Comptroller of the Currency (OCC) guidance emphasizes the need for stronger application security within financial institutions and their third-party service providers to maintain integrity of data, mitigate true risks and avoid being prime targets for criminal activities. We queried two information security...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
The recent release of a University of Michigan study on the security flaws of online banking websites brings attention to the often overlooked area of web application security.
In this exclusive interview, Jeremiah Grossman of WhiteHat Security shares his insights on the importance of web application security for...
Mobile banking, Web 2.0, remote check capture - they're among the emerging technologies that appeal most to banking institutions. The key driver: the chance to offer more services to customers, and also cut costs through the further automation of banking transactions.
We recently spoke with leaders of the top...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Risk management and the insider threat.
These are the two dominant themes emerging from the conversations and presentations at the RSA Conference in San Francisco this week.
From the keynote stage to the expo floor, with stops in between at the program sessions, information security experts, vendors and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.