The payments system is broken, opening consumers, financial institutions and retailers to endless incidents of card fraud. So, what can be done? Gray Taylor has some suggestions.
Sen. Charles Schumer is asking the Federal Trade Commission to look into a new practice in which credit agencies keep estimates of individuals' personal information such as medication use and personal income from consumers.
An estimated 650,000 customers have recently switched from big banks to community banks and credit unions. But are these smaller institutions prepared for the new demand for security and fraud prevention?
Want more money to spend on your enterprise's information security programs? Deloitte's Mike Brown and Amry Junaideen say IT security managers must show their non-IT bosses how the lack of IT security would adversely affect their operations.
Improving mobile device security is one of the top information security priorities for the coming year, according to our new Healthcare Information Security Today survey. And that's not surprising, given the recent surge of interest in tablets, smart phones and other mobile devices.
When it comes to responding to today's high-profile information security incidents, technical abilities simply aren't enough, says Gavin Reid of Cisco's Computer Security Incident Response Team. Here are the five must-have skills for today's incident response professionals.
Two fraud suspects had the perfect scheme, skimming payment card numbers at local gas pumps and then using counterfeit cards to buy more than $70,000 worth of goods at area merchants. But then they got greedy.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
As two recent fraud incidents prove, good work can be done when card issuers and retailers work in tandem. I hope we see more of that kind of collaboration going forward.
Police say financial specialist Librado Wright spent months siphoning more than $500,000 from Wachovia Bank's customer accounts. But when he attempted to withdraw the funds, the bank had a surprise for him.
A new intelligence community report to Congress shows how the proliferation of new technologies, such as portable devices that connect to the Internet, will create new espionage opportunities for malicious actors.
ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
The draft publication defines high-priority requirements for standards, official guidance and technology developments that need to be met in order for agencies to accelerate their migration of existing IT systems to the cloud computing model.
On Tuesday, Bank of America caved in to competitive and public pressure, reversing its decision to impose a fee for consumer debit transactions. So, now where will institutions find new revenue to help fight fraud?
Online risks, card skimming and data leakage are the top threats to Asia Pacific and Indian banks, and financial institutions are just starting to implement security measures and regulations to combat the growing threat landscape, says Gartner's Matthew Cheung.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.