This time the news was so big it couldn't even wait til Friday.
Up to this point, as you know, whenever the FDIC has closed a bank this year, it's waited til after markets have closed for the week - let things settle over the weekend, and then the failed bank can reopen under its new flag on Monday.
But...
Leading Technology Vendor Discusses the Need for Vulnerability Assessments & Remediation Processes for Applications Whether Developed In-House or By a Third-Party
Application security is a key focus of regulatory agencies - ensuring that financial institutions pay as much attention to third-party applications as...
I was presenting at a credit union conference this week, where the session before mine covered current economic conditions. The timing was perfect in a macabre sort of way, as the 24 hours prior were filled with news about the Merrill Lynch rescue and Lehman Brothers collapse. As part of the Q&A phase, a prediction...
You know someone. Out of millions of Merrill Lynch customers, you should know at least one. Combine Bank of America's many more millions of banking customers, and you have to know someone. I know quite a few myself. All of these people are waiting to be absorbed into what is ultimately a new regime. This state of...
I can't say enough about the mud slinging and finger pointing being done during the continuing mortgage crisis. It is getting ugly out there. Even the government-sponsored enterprises Fannie Mae and Freddie Mac are now under the watchful conservatorship eye of the federal regulators, as the mortgage foreclosures top...
A recent Comptroller of the Currency (OCC) guidance emphasizes the need for stronger application security within financial institutions and their third-party service providers to maintain integrity of data, mitigate true risks and avoid being prime targets for criminal activities. We queried two information security...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
Organizations often face the task of trying to recover data from water-soaked hard disks or servers that have been flooded by hurricanes, bad weather, or even the sprinklers going off in the branch or building.
Rule one -- don't assume that data isn't recoverable, no matter what it has been through, says Jim...
Everyone was watching the Olympics this past month and saw lots of records being broken. But there is one record no one want to be included in -- the record number of 449 data breaches that have happened (and been made public) and recorded by the Identity Theft Resource Center.
Unfortunately for some unlucky...
The Bank of New York Mellon (BNY Mellon) has announced that the data breach that occurred back in May is much bigger than the 4.5 million records originally announced. The bank now says that another 8 million customers were affected by the breach, bringing the total figure to 12.5 million, which may make it the...
GLBA who? Bank Secrecy what? Insider Threat?...is that something mob-related?
Your customers may not even know your institution is examined for security compliance by the banking regulatory agencies, and so most likely will have never even heard about the ID Theft Red Flags Rule and the impending November 1 ...
So, I'd started my weekly blog entry intending to discuss application security (I'm keenly interested in what the just-released BIS survey is going to reveal) when the following headline came across on my BIS RSS feed "Social Engineering Hits Brit Bank Head, Victim of Fraud."
You'll have to forgive me for being so...
A Wells Fargo bank access code was used to steal the personal information of roughly 5,000 consumers, leading the bank to conduct a full-scale inquiry into the data breach.
Wells Fargo says it was notified on July 1 by MicroBilt, an online consumer and commercial credit bureau information provider, that someone had...
Maybe the Countrywide television ads that constantly run on cable news shows I watch on weekends will now tout, "Finance your mortgage with Countrywide, and have your identity stolen at the same time for mere pennies."
The recent arrest of a former Countrywide employee in the insider identity theft case, where an...
"Whitelisting" is a new twist on information security. Instead of trying to find a software solution that keeps all of the potential bad guys out of your systems, whitelisting allows you to establish a protection layer that grants access to only your finite list of good guys - individuals or applications.
In this...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.