What's one of the biggest threats to Florida banking institutions? Regulatory reform, according to Alex Sanchez, head of the Florida Bankers Association.
"We're easy targets," says Sanchez, who fears Main Street institutions will take it on the chin from legislators for economic mistakes made by Wall Street and...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
Information technology (IT) security is indispensable to an organization's ability to conduct business and achieve its objectives. With regulatory compliance and industry data security standards dominating many of these business objectives, confidential data protection comes to the forefront of IT security....
Are you and your customers better off today than you were a year ago?
This is the key question to be explored in the Banking Information Security Today survey. The 2010 study explores how banking/security leaders are responding to today's key banking issues, including fraud prevention, regulatory compliance and...
What are the top fraud trends facing financial institutions in 2010?
Gartner's Avivah Litan shares her insights in an exclusive interview with Information Security Media Group's Linda McGlasson, discussing:
Increased number of attacks on strong authentication;
How to handle ACH fraud;
The biggest security...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Joe Bernik, a banking and security veteran, has recently joined Fifth Third Bank as its new CISO. Among his challenges: preventing external attacks and building better internal relationships with business partners.
In an exclusive interview, Bernik discusses:
The evolution of information security and risk...
The rules of job seeking are in constant flux - particularly in information security, where job demands and requirements are ever-evolving.
Where does that leave a job seeker looking to stand out from the crowd?
The following are strategies offered by information security hiring managers:
Securing a financial services network environment can be a daunting challenge. At issue is not only meeting the basic business requirement of ensuring that a customer's financial information remains private and secure, but to do so in accordance with the variety of regulations that have been implemented by state and...
As more financial and commercial activity move online, banks are seeking to bolster consumer security and confidence. Gartner, in a 2008 report, reveals that most consumers consider security features extremely important factors that influence their decisions to bank online and do ...
Social media sites are changing the rules of job search, offering a new relationship-based approach that allows individuals and organizations to build communities through online profiles, affinity groups and networks of contacts.
The number of identity fraud victims increased 12 percent to 11.1 million people in 2009 -- the second consecutive annual increase. At the same time, the total amount of fraud also increased by 12.5 percent to $54 billion.
These are the headlines of the newly-released 2010 Identity Fraud Study by Javelin Strategy &...
The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
What must financial institutions do to improve security education?
Identity theft expert Robert Siciliano shares his thoughts on the need to change the mindset of financial institutions when it comes to educating their customers about identity theft and security issues. Among the topics he discusses:
Why "old...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.