Years ago, when I learned to drive and got my first cars, my approach to automobile maintenance was: If the "Check Engine" light came on, keep driving. Whatever the problem is, I'll drive out of it.
I see a disturbingly similar pattern now in the banking industry.
Interview with Srinivas Mukkamala
When it comes to incident response, there's nothing for critical than first response. And first response skills are exactly what students are attaining in a unique information assurance program offered by New Mexico Tech.
In an exclusive interview, Srinivas Mukkamala of New...
TJX. Hannaford. Heartland. Those are the names we all know, the famous fraud stories we all can recite by heart.
But who knows about Unique Industrial Product Co., a Sugar Land, Tex.-based company that lost $1.2 million to fraudsters this last April?
This past Independence Day weekend, hackers targeted government and business websites in the United States and South Korea, causing confusion for network managers to differentiate between legitimate and illegitimate web traffic.
Security related incidents such as these have become not only more numerous and...
I got a call recently from a friend of mine (let's call her Sally) who is a fraud expert in the financial services industry. She had just heard from her bank, US Bank, asking if she'd been to Orlando recently. She responded no, she hadn't (It is never a good thing when your bank asks if you've been somewhere you...
The Heartland data breach and July's denial of service (DDoS) attacks against government agencies are among the biggest information security incidents of the year. And they've pushed incident response into the spotlight.
Peter Allor is on the Steering Committee of the Forum for Incident Response and Security Teams...
The worst thing a bank president or a senior management team at a financial institution can hear is "We've had a data breach."
John Scanlon, a senior executive at Intersections, speaks to data breach readiness and the lessons learned from others' incidents. Intersections is a business partner of the Identity Theft...
The Heartland data breach and July's denial of service (DDoS) attacks against government agencies are among the biggest information security incidents of the year. And they've pushed incident response into the spotlight.
Peter Allor is on the Steering Committee of the Forum for Incident Response and Security Teams...
A veteran cybersecurity pro, Shane Sims shares his insights on trends he's seeing as cybercrime continues to hit all companies, including financial institutions. Sims is currently a Director in the Forensic Services practice at PricewaterhouseCoopers, where he provides investigative, forensic technology, security...
A veteran cybersecurity pro, Shane Sims shares his insights on trends he's seeing as cybercrime continues to hit all companies, including financial institutions. Sims is currently a Director in the Forensic Services practice at PricewaterhouseCoopers, where he provides investigative, forensic technology, security...
The power of social networking web sites can be measured by just looking at the number of hits (or visits) to a person's web page on such well-known sites as MySpace or Facebook.
The negative side web users should consider before placing information on such social networking sites include the connection one...
So, did anyone read about the President's Cybersecurity Action Plan? I'm assuming you've read through all 10 points. You didn't stop to ponder after the first few did you? I mean, you didn't happen to stop after number 8? The one about the incident response plan?
OK, back home and back in the office fulltime after a couple of weeks on the road to California for the RSA Conference and a bit of R&R. Some observations as I clear my desk ...
I certainly wasn't around during the Spanish Flu pandemic of 1918-1919 - I vaguely remember the 1968 Asian Flu pandemic as a small child - but some of my relatives recall that health catastrophe of 88 years ago.
My 95-year-old great uncle remembers the 1919 school year as being abbreviated, cut short as a second...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.