The ex-Goldman Sachs employee accused of taking proprietary trading code is only one example of the insider threat within financial services companies. Jacob Jegher, banking analyst with Celent, discusses:
Lessons learned from the Goldman Sachs case;
The importance of policies and procedures when it comes to...
Do you truly know who's accessing your critical information systems?
The Heartland data breach and Countrywide insider crime remind us: These systems are vulnerable to malicious attacks from outside and within the institution.
And recent consolidations and mergers within the industry also underscore the...
Lexis-Nexis made public notification of a data breach that federal authorities say is tied to a New York mafia crime family. The New York-based company has sent more than 13,000 letters to former customers whose personal data may be at risk. The 13,000 customers may have been targeted for extortion and identity theft.
The ex-Goldman Sachs employee accused of taking proprietary trading code is only one example of the insider threat within financial services companies. Jacob Jegher, banking analyst with Celent, discusses:
Lessons learned from the Goldman Sachs case;
The importance of policies and procedures when it comes to...
In another high-profile insider theft case involving a financial services company, the U.S. Justice Department and FBI agents arrested a former Goldman Sachs computer programmer on July 3, charging that he stole computer codes linked to the Wall Street trading firm's high-speed transaction platform.
According to...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
Bernard Madoff will spend the rest of his life behind bars, as he was sentenced today to 150 years in federal prison for the biggest Ponzi scheme ever perpetrated.
Earlier this year in March, Madoff, 71, pled guilty to swindling thousands of investors out of billions of dollars. Prosecutors say the Ponzi scheme...
The NISP Operating Manual (NISPOM) prescribes the requirements, restrictions, and other safeguards necessary to prevent unauthorized disclosure of classified information by US Government Executive Branch departments and agencies. NISPOM Chapter 8 addresses information-system security procedures and...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
In an exclusive interview, Bryan Sartin of Verizon Business, discusses the company's exhaustive research of...
A former bank teller in Massachusetts has been charged with fraud and aggravated identity theft in a $270,000 fraud scheme. The FBI investigation led to a 25-year-old who worked as a bank teller at a Bank of America branch in Peabody, MA.
Electronic communication is at the heart of every organization, but one compromised e-mail can damage your corporate brand, compromise intellectual property or put you in non-compliance with laws and industry regulations. Privacy concerns, regulatory compliance, and corporate guidelines all need to be factored into...
The Securities and Exchange Commission charged Angelo Mozilo, the former chief executive of the mortgage lender Countrywide Financial, and two other company executives with civil fraud on Thursday.
Verizon Business investigated 90 major data breaches in 2008, including 285 million compromised records. Nearly ¾ of those breaches were external hacks, and 99.9 percent of the records were compromised via servers and applications.
These are among the findings of Verizon's new 2009 Data Breach Investigations...
Bank fraud has evolved over the last several years, but some classic variations keep financial institutions busy.
Here are six old fraud tricks that are back with new twists to bedevil fraud departments and information security professionals.
When is an outsider really an insider? That is the question every financial institution has to answer when reconciling security issues and the use of third-party service providers.
At Central Bank, Lexington, KY, Chris Schum, IT Security Manager, Technology Services, says the bank uses port lockdown software to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.