International communication and public-private partnerships are the keys to cybersecurity in the financial space, according to the Department of Homeland Security and the Financial Services - Information Sharing and Analysis Center.
The inability of the Department of Homeland Security to implement appropriate IT and application controls has placed at risk the confidentiality, integrity and availability of DHS's financial and operational data, according to an audit conducted for the department's inspector general.
Intelligence expert Terry Roberts says cyber intelligence, a new approach to IT security, could make significant gains in the coming year. "The good thing is, this isn't really rocket science," says the chair of the Intelligence and National Security Alliance's Cyber Council.
The Reserve Bank of India issued guidance in April, 2011 for banks to mitigate the risks of use of information technology in banking operations. Here is an overview of the nine topics specifically addressed by the guidance.
"The biggest change these guidelines are bringing is in making information security a board level issue for all banks," says Kamlesh Bajaj, CEO of DSCI.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
Government officials have confirmed a potential threat by al-Qaida against the United States as the nation approaches the 10th anniversary of the Sept.11, 2001 terrorist attacks that hit the World Trade Center and Pentagon.
The Treasury Department's Office of Terrorism and Financial Intelligence has worked to prevent anti-money laundering and illegal cash flow from reaching the hands of terrorist groups, but more needs to be done to further mitigate risks, says Treasury Assistant Secretary Daniel L. Glaser.
Comptroller General Gene Dodaro uses the approaching 10th anniversary of the Sept. 11 terrorists attacks to assess the progress DHS made in implementing its security missions, including cybersecurity.
Amedisys, a national home health and hospice provider, developed a comprehensive information security strategy that relies on encryption, DLP and other technologies.
Doug Johnson of the ABA and FS-ISAC says banks and commercial customers are improving efforts to catch and thwart incidents of corporate account takeover, a sign that the industry is moving in a positive payments direction.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.