A new survey finds that only 56% of U.S. banking institutions have conducted risk assessments, but 87% have deployed layered security controls. Are banks ready to conform with the FFIEC Authentication Guidance?
In an exclusive interview about the findings of this new survey, Austin discusses:
Banking...
When the Commonwealth of Pennsylvania suffered a major security breach a few years back, vulnerabilities in a Web application were to blame. CISO Erik Avakian explains how the state developed a process to correct flaws in application code.
Researchers from Kaspersky Lab say at least two other pieces of malware may have been developed on the same computing platform, perhaps by the same individuals.
When Liberty Bank began reviewing online risks to conform with the FFIEC Authentication Guidance, layered security came up as a weak spot. So how did this community institution address its risks?
Breaches have an adverse impact on the fundamental operations of a business or government and without fully understanding that, executives and managers cannot smartly run their operations successfully.
According to court records, Sabrina Matache and her co-conspirators collected PINs with hidden pinhole cameras installed near compromised ATMs at People's United Bank branches in Connecticut.
The key message from the recent court ruling on the Hannaford data breach: You don't have to suffer fraud to be a victim. Attorney Ronald Raether explains what this decision means for future breaches.
Drafters of House and Senate bills aimed at protecting intellectual property have overlooked unintended consequences around proposed legislation, says the Brooking Institute's Allan Friedman.
"Satisfying a court order is heavy lifting," says Greg Thompson of Scotia Bank. "The cost and risks of outsourcing this service with regards to the number of litigations we are dealing with has skyrocketed."
What's the connection between 14 Romanians and an alleged phishing scheme that involved 10 U.S. banks and their customers? A new, unsealed indictment outlines a massive fraud and ID theft conspiracy.
The scheme allegedly involved insiders recruited by fraudsters to steal information about more than 200 individuals and organizations. How can institutions improve background screening and prevent fraud?
The information security job market is evolving into highly specialized areas, says Eugene Spafford, noted professor at Purdue University. So, how must students now prepare themselves for these new career paths?
The current breach notification landscape is rocky, with 47 U.S. states each having different notification requirements, as well as conflicting global breach legislation causing further disharmony. How can global organizations overcome these breach notification challenges in their compliance efforts?
Having a breach response team in place at your organization is a necessity in today's threat environment. But how - before a breach occurs - do you know if your team is truly effective?
The potential 30-year prison term and $1 million fine are significant, but so is the actual plea agreement - which may signal a new tactic in law enforcement officials' efforts to break up fraud rings.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.in, you agree to our use of cookies.