Finally, it's your turn to have your say.
Since first joining Information Security Media Group late last summer, one of my primary goals has been to debut a blog for BankInfoSecurity.com and CUinfoSecurity.com.
Today, proudly, I'm able to announce the launch of not just one blog, but five - with more to come in...
On one hand, this step does show that the business has made a conscientious effort to plug a major security hole.
But on the other, can't you see that first lawsuit filed by a breached customer saying "Hey, you gave me this stuff and said my PC was safe ...?"
Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
Over the past 10 years, a primary concern for financial institutions was securing the perimeter of your network from attack by anonymous hackers. Today, your perimeter is secure, and your next biggest threat is from within. How is this? Security gaps created by silos...
Today, financial institution employees...
A financial institution can outsource a service, but it cannot cede responsibility for the potential risks to itself and its customers.
This is the message from banking regulatory agencies to member institutions, hammered home by recent bulletins from the Federal Deposit Insurance Corporation (FDIC) and Office of...
The Federal Reserve Banks have 12 information security control deficiencies that must be improved, according to a new report from the U.S. Government Accountability Office (GAO).
On Monday, June 16, the GAO issued its annual audit report in connection with its requirement to audit the financial statements of the...
With just under five months to go before the Nov. 1 deadline, how close are financial institutions to compliance with the new Identity Theft Red Flags Rule?
This is the key question to be answered by a new survey from Information Security Media Group (ISMG), which seeks to shed new light on what tracks to be one of...
The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
With all due respect to the pugilist fan base still out there, the FDIC used a classic left-right combo this past week aimed squarely at the jaw of the third-party service provider community.
First Sheila C. Bair, the Chairman of the FDIC, touched on emerging guidance regarding third-party service providers in
Do you know how prevalent workplace violence is?
There are over 1.7 million instances of workplace violence each year in the U.S., including simple and aggravated assaults, robbery, rape and homicide. In addition, issues surrounding workplace violence include threats, non-fatal injuries, lost work productivity,...
Information security wasn't on the front burner, but it has to be a powerful afterthought following last week's testimony by banking regulators before a U.S. Senate committee.
Fallout from the subprime mortgage crisis was the hot topic, as heads of the regulatory agencies delivered their "State of the Banking...
The clear message from banking regulators in their Senate testimony is: Banks are hurting.
The follow-up question is: Exactly how badly are they hurting, and how will their pain trickle down to impact information security programs and priorities?
The OCC recently issued a bulletin (2008-16) in which it targets application security and the need for banking institutions to properly address application security "whether internally developed, vendor-acquired, or contracted for." I for one am relieved.
There was one thing that always bugged Steve Jones when he thought about customer data protection at his credit union - email via the Internet.
Email is so ubiquitous -- essential to communications both within the institution and with the outside world, including customers. But it's also fraught with security...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.