The FTC claims hackers targeted the Wyndham hotel chain's network and exported debit and credit data to a domain in Russia. What do the breaches mean for card issuers, and what action should they take?
For United Bank & Trust, cost, efficiency and customer adoption were big considerations when it came to FFIEC conformance. How did this $1 billion institution determine the best authentication option?
When it comes to fighting financial fraud, Peter Tapling of Authentify says banking institutions are chronically underestimating and under-utilizing one key resource: Their own customers.
With the increasing amount of data being collected by organizations, the role of the data scientist has emerged to aid in analysis. What's unique about the role and what job functions does it entail?
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
Some organizations are focusing so much attention on the bring-your-own-device trend and on implementing a mobile device management system that they're neglecting mobile app security issues, says security expert Jeff Williams.
The out-of-court settlement reached in a dispute between Village View Escrow and Professional Business Bank shows it's getting more difficult for banks to avoid liability, experts say.
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
Online banking attacks are up, but financial losses linked to account takeovers are down. What does this shift say about the future of fighting ACH/wire fraud? The FS-ISAC's Bill Nelson weighs in.
A lingering legal dispute over a corporate account takeover incident at escrow company Village View has finally come to a close. Find out more about the details of the case and the settlement.
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
State Street Corp. scientist David Saul says most financial institutions have plenty of information, but are not doing enough to exploit the business benefits of so-called "big data."
A New York-based credit union says it inadvertently exposed debit details and some personal information about cardholders after a non-secure file was accidentally made accessible via its website.
LinkedIn contends it had on staff world-class security experts when nearly 6.5 million members' hashed passwords were pilfered, although the social media company has neither a chief information officer nor chief information security officer.
Howard Schmidt takes exception with aspects of our blog that addresses his position in the White House hierarchy and relationship with agencies' chief information security officers. Here's his response.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.