Most organizations, including banks, have more data than they know what to do with, says Allison Miller, a cyberthreat and data analytics expert. So why aren't they more effectively using big data analytics for fraud prevention and detection?
The best way to detect whether hackers have penetrated an IT system is to examine outbound traffic, says Eric Cole, the latest inductee to the Infosecurity Europe Hall of Fame.
A George Mason University research fellow says the cybersecurity framework, issued earlier this year by the National Institute of Standards and Technology, is likely to cause more problems than it solves.
Verizon's latest annual breach report shows that Web application attacks increased more than malware-fueled point-of-sale intrusions in 2013, says analyst Dave Ostertag, who provides an overview of the report's findings.
Dennis Simmons, retiring CEO of SWACHA, says new career paths are being forged for IT professionals as well as legal experts who have good understandings of cybersecurity and cross-channel fraud in the world of e-commerce.
Ellen Richey of Visa, keynoter at the April 29 Fraud Summit San Francisco, outlines key card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
Not only has the CISO role evolved into information risk management, but it also has gained greater visibility to senior leaders. Parag Deodhar of Bharti AXA Gen. Insurance discusses the new expectations.
Microsoft's Pierre Noel focuses on helping Asian nations build their cybersecurity infrastructures and policy frameworks - often from the ground up. How does he approach this mission, and what lessons can he share?
Malcolm Harkins has a unique role. He oversees both security and privacy for global technology vendor Intel. What tips does he offer individuals who seek to build careers in either discipline - or both?
Banking institutions and retailers are working to enhance cybersecurity collaboration, but the Consumer Bankers Association wants more regulatory oversight of merchants, says the CBA's David Pommerehn, a speaker at the upcoming Fraud Summit San Francisco.
A notion emerging from the Heartbleed bug is that organizations can't determine if the vulnerability caused data to be exfiltrated. But CERT's Will Dormann says that may not always be the case.
The chief executive of the Finnish company that uncovered the Internet website vulnerability known as Heartbleed says security practitioners should rethink how they approach IT security by placing a greater emphasis on vetting software for vulnerabilities.
Symantec's 2014 Internet Security Threat Report calls 2013 the year of the mega breach. Why? Because it's getting far too easy for the bad guys to pull off these breaches, says Symantec's Kevin Haley.
To boost cybersecurity, senior leaders - whether a CEO, a board member or a government agency director - need to think of information as a critical asset worthy of protection, risk management experts Val Rahmani and Malcolm Harkins say.
Years before she helped put fraudster Albert Gonzalez behind bars, Kim Peretti was an attorney who had dual interests in law and technology. How did she channel her interests into a prominent career?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.