Banking institutions are making technology strides to fight fraud. But how will emerging channels and services, such as mobile payments, impact these investments?
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
Intuit and GE veteran Steve Bennett, chairman of the IT security software provider, replaces Enrique Salem, the longtime Symantec executive who had served as the company chief executive officer since April 2009.
How well do U.S. credit unions conform to the FFIEC Authentication Guidance? An NCUA official discusses the state of conformance and what its examiners have learned from institutions.
A successful organization in today's business world has most likely cultivated a "brand." Have you ever thought about creating your own brand to enhance your career?
A Mississippi bank is taking legal action against a former commercial customer, claiming the customer is liable for losses and damages linked to a suit over ACH/wire fraud.
The draft guidelines recommend developing system threat models, instituting a mobile-device security policy, implementing and testing a prototype of the mobile-device solution and securing a device before allowing user access.
Don't be too quick to write off the PATCO court ruling as a victory for banking customers in the debate over ACH/wire fraud liability. The reversal could actually be a win for banks.
In a tribute, we remember Terrell Herzig, information security officer at UAB Health System, an innovator who was passionate about sharing best practices for protecting sensitive information.
The First Circuit Court of Appeals ruling offers a fascinating look at exactly which security controls Ocean Bank, now People's United Bank, did - and did not - offer to customers such as PATCO.
How are banks addressing mobile security risks? Bank of America's Keith Gordon says most are just beginning to forge ahead in the mobile space, and new security gaps are areas for which institutions have to prepare, proactively.
Some organizations are focusing so much attention on the bring-your-own-device trend and on implementing a mobile device management system that they're neglecting mobile app security issues, says security expert Jeff Williams.
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
State Street Corp. scientist David Saul says most financial institutions have plenty of information, but are not doing enough to exploit the business benefits of so-called "big data."
Howard Schmidt takes exception with aspects of our blog that addresses his position in the White House hierarchy and relationship with agencies' chief information security officers. Here's his response.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.