Mastercard says that starting in 2024, banks and other institutions that issue its credit and debit cards will no longer need to include a magnetic stripe on the back, and that by 2033, m
agnetic stripes will be extinct. Given magnetic stripes' many security downsides, what's taken so long?
Despite these financial headwinds, new ways are emerging for FIs to differentiate on the quality of fraud prevention and outreach they can provide to customers.
The latest edition of the ISMG Security Report features an analysis of the cybercrime-as-a-service model and how law enforcement could potentially disrupt it. Also featured: T-Mobile probes a massive data breach; tackling abuse in the workplace.
A group of cybersecurity professionals has launched Respect in Security to take a stand against all forms of harassment within the industry. Initiative co-founders Lisa Forte and Rik Ferguson describe their commitment to creating workplaces free from harassment and fear.
Joshua Brown, who recently took over as global CISO for H&R Block, has started tackling issues ranging from creating metrics for the security team to deploying "zero trust." Brown is striving to create an inclusive team to reflect the firm's values.
Gökhan Yalçın, CISO of Turkey's Yapı Kredi Bank, says integral training for his role has included not just learning how to defend bank networks but also stints working for security vendors as a consultant supporting different sectors, which helped sharpen both his technical and nontechnical skills.
For the fifth consecutive year, the supply of those with cybersecurity skills is far too low to meet the demand, according to a new report. Cybersecurity pros offer insights on how to change that.
A seemingly nonstop number of ransomware-wielding attackers have been granting tell-all media interviews. One perhaps inadvertent takeaway from these interviews is the extent to which - surprise - so many criminals use lies in an attempt to compel more victims to pay a ransom.
To recruit and retain cybersecurity specialists, organizations must "stop expecting people just to be sort of 'focused monkeys' and doing one particular task and turning the handle," says Keith Martin, professor of information security at Royal Holloway University in the U.K.
In the latest weekly update, four editors at Information Security Media Group discuss important cybersecurity issues, including the use of commercially available spyware and security risk management in the telecom sector.
Can NSO Group and other commercial spyware vendors survive the latest revelations into how their tools get used? The Israeli firm is again being accused of selling spyware to repressive regimes, facilitating the surveillance of journalists, political opponents, business executives and even world leaders.
The world is now focused on ransomware, perhaps more so than any previous cybersecurity threat in history. But if the viability of ransomware as a criminal business model should decline, expect those attackers to quickly embrace something else, such as illicitly mining for cryptocurrency.
Rob Clyde of ISACA discusses his ideas for how to raise up the next generation of "cyberwarriors" to serve on the front lines of active defense against cyberthreats.
A cybercrime forum seller advertised "a full dump of the popular DDoS-Guard online service" for sale, but the distributed denial-of-service defense provider, which has a history of defending notorious sites, has dismissed any claim it's been breached. What's the potential risk to its users?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.