Cyber insecurity is the leading threat to growth in the banking industry. But as demonstrated by recent major breaches, merely following
regulatory rules will never keep pace with the constantly growing and changing cyber threats.
Download this white paper to learn:
How to stop advanced threats.
Protect...
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
The sheer volume of data moving between agencies, contractors and citizens to support collaboration is staggering and impressive. Moving and keeping this data safe becomes a top priority, especially with the growing number of computers, devices, systems and applications. Agencies must determine how to handle multiple...
Information security experts are calling on Google to rethink its patch priorities after it declines to fix a critical component that runs on Android 4.3 "Jelly Bean" and older devices, leaving an estimated 930 million mobile devices at risk.
President Obama's call for enactment of a national data breach notification law has been widely welcomed by business groups and privacy advocates, but their endorsements come with a big proviso: What's in it? The White House hasn't furnished details.
ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.
Hackers released sensitive information from Banque Cantonale de Geneve (BCGE) after the Swiss bank declined to pay attackers' ransom demand. Hacking group Rex Mundi claims it exploited a SQL injection flaw to breach the bank's defenses.
U.S. Central Command's Twitter and YouTube accounts were hacked Jan. 12, reportedly by ISIS sympathizers. The account compromises came the same day President Obama proposed new cybersecurity measures, including a national breach notification law.
Following the Paris attacks, Britain's prime minister hopes to reintroduce a controversial surveillance bill known as the "Snooper's Charter." Meanwhile, many European countries - and the U.S. - plan to increase anti-terrorism collaboration.
The Paris terrorist attacks could make it more likely Congress will renew the USA Patriot Act and less likely that lawmakers will curtail a program to collect metadata on telephone conversations of Americans.
Bankers are criticizing one federal regulatory agency for how it has responded to a breach of unencrypted consumer data that occurred during a routine banking exam. They're saying regulators should focus more on their internal security practices.
The FBI has attributed the Sony hack to North Korea, in part by analyzing the messages left by the "G.O.P." attackers. But linguistics expert Shlomo Engelson Argamon says the messages appear to have been written by native Russian speakers.
Your employees, from the C-suite to entry level, hit 'Send' hundreds of times every day. It's so easy to click that seemingly innocent send button that-in the moment-you may not realize the risk.
Thanks to the Snowden revelations and a never-ending cycle of breach news, we are now far more aware of the risk. Now...
You've screened your candidate, hired them into the position, assigned them resources and granted them access...now what? Hope they don't rob you blind? Trust them completely? The real job has just begun, now you have to:
Translate risk levels into appropriate levels of scrutiny, the greater the access, the...
In the wake of the Paris massacre, the head of Britain's MI5 domestic intelligence agency has called for new powers to fight extremism, warning that as terror plots increase, communications-interception capabilities are decreasing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.