Common mistakes enterprises make while prescribing a security or information assurance policy may result in big security flaws. CISOs must define security policies that are practical and enforceable, evolved through consensus with the business.
Cyber-insurance holds promise for enterprises looking to suitably cover risk in an unpredictable, and rapidly evolving information security landscape. Dinesh Bareja shares his thoughts on setting the groundwork.
As banking embraces emerging technologies, security leaders face increased cyber-risks. But they can leverage this three-step prevention, detection and response framework for simplified security management.
The chief privacy officer's role has changed considerably, particularly in response to today's cyberthreats. As a result, CPOs at banking institutions need to be collaborators, designers, gatekeepers, teachers and more.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
Emerging malware increasingly puts banks and their customers at risk for fraud. The sooner malware is detected and removed, the less likely banks are to suffer regulatory penalties and fines, and steep losses linked to fraud.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.
Financial Institutions already apply out-of-band security in many instances. The challenge is: How do we help protect payment cards when they are used at any number of online and brick-and-mortar retailers?