Why are breaches in the payments arena so difficult to trace and investigate? Verizon breach investigator Dave Ostertag offers insights about the forensics complexities of a processor breach.
Israel's intelligence agency supervises commercial banks' IT systems because they're considered part of the critical national infrastructure, and that's okay with the bankers. See why.
An attack on the Thrift Savings Plan exposed personal details about more than 120,000 federal pension participants. Learn why one expert says the breach could have serious long-term implications.
What are the top four malware-related issues that all organizations should focus on this year? Andreas Baumhof of ThreatMetrix shares insights based on five years of malware analysis.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?
Cloud services contracts often provide little to no wiggle room. What steps do organizations need to take before signing any contract? IT security lawyer Françoise Gilbert offers some key strategies.
Imagine a computer network that can fool intruders into seeing configurations that in reality don't exist, making it hard for them to invade the system. That's what Scott DeLoach is trying to figure out how to do.
Hacktivist attacks will increase, and researcher Gregory Nowak says organizations can take proactive steps to reduce exposure and protect brand reputation. Why, then, are many organizations failing?
More banks are considering voice biometrics, though some still question if the tech is ready for prime time. What has sparked institutions' interest in this emerging authentication technology?
The statistics revealed in the ACFE's new 2012 Report on Occupational Fraud and Abuse are all very real. Here are my insights on occupational fraud and steps leaders can take to detect these crimes.
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
New alerts from Visa and MasterCard suggest the breach at Global Payments dates to January 2011, an exposure window significantly longer than originally reported. What are the implications for card issuers?
Banks have a lot of data, but how well is it integrated? How much are institutions gleaning from the data they house? State Street Corp's chief scientist says financial services could be doing more.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.