In the age of cyber fraud, classic bank robberies continue to plague financial institutions. How is a new FBI program helping institutions improve how they repel and respond to these crimes?
A security firm has uncovered a wave of fraud striking corporate checking accounts in the U.S., U.K. and China. How are the criminals gaining access to supposedly secure banking credentials?
Are banks and credit unions focusing too much attention on authentication and not enough on layered security? In their efforts to conform to the FFIEC's updated Authentication Guidance, they could be missing the fraud-prevention mark.
Few banking institutions see mobile as a means to address security and fraud-prevention. Javelin's Jim Van Dyke tells how institutions - and their customers - can enhance security via mobile.
Partisan bickering surrounding a bill aimed at protecting the nation's critical IT infrastructure is the likely reason the measure will not come up for a vote in the lower chamber this week, as representatives debate four other cybersecurity bills.
Gartner fraud expert Avivah Litan shares ideas about how lessons learned from the Global Payments data breach can help security practitioners mitigate card-fraud risks and prevent future incidents.
Banking institutions expect significant increases in fraud-fighting resources in 2012. But in which solutions should they invest? Banking CTO Michael Wyffels has some prioritized suggestions.
When it comes to fighting financial fraud, Peter Tapling of Authentify says banking institutions are chronically underestimating and under-utilizing one key resource: Their own customers.
When it comes to the FFIEC Authentication Guidance, Aite analyst Shirley Inscoe fears too many banking institutions are investing only in achieving compliance - not ongoing security.
Eighty-five percent of data breaches go undetected, but organizations have a new type of cop on the beat to ferret out these illicit activities - the data scientist, says Phil Neray, head of security intelligence strategy and marketing for Q1 Labs, an IBM company.
As the House prepares to vote on a slew of cybersecurity bills, James Lewis of the Center for Strategic and International Studies provides the skinny on the measures and their chances of passage.
In this whitepaper you will get an overview of Access Governance, introducing the concept, the business drivers, and the associated challenges. The paper explains a four-phase approach to achieving Access Governance and explores the capabilities that are required in each phase.
Topics covered in the whitepaper...
Organizations of all sizes continue to face ever-stricter regulatory and security requirements to protect their IT assets from unauthorized use. In response, many enterprises have embarked upon Identity and Access Management (IAM) initiatives, only to be disappointed with the cost, speed and effectiveness of their...
What security vulnerabilities are exposed by recent skimming attacks at eight Toronto hospitals? Fraud experts say there are lessons to be learned when placing ATMs outside traditional bank locations.
Rep. Dan Lungren introduced an amendment to his onetime bipartisan cybersecurity bill that won only the backing of fellow Republicans with Democratic members of the House Homeland Security Committee objecting to the changes.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.