Yes, yes, we all know the economy is hanging by threads right now. Banks that have been around forever are closing around us, the largest financial institutions are faltering, the stock market is down and up and down and up again, the Treasury is pumping hundreds of billions of dollars into the economy, and we are all...
The World Bank, an internationally-supported institution that provides loans to developing countries, is reported to have suffered a network intrusion that one insider labeled "an unprecedented crisis."
The breach, first reported by Fox News, alleges that servers in the Washington, D.C.-based bank's treasury unit...
First in a Series of New Roundtable Events Showcasing Emerging Technologies...
Hear about emerging trends in consumer authentication
Find out how consumer authentication can be improved with emerging technologies and new functionalities
Learn how to use authentication as a means to restore trust in your...
This is a transcript of a recent webinar, Insider Threats - Safeguarding Enterprise Information Assets, sponsored by Imprivata. This session discusses the need and importance for convergence of physical and logical access control. To highlight the significance, Imprivata showcases their revolutionary product,...
Maybe the Countrywide television ads that constantly run on cable news shows I watch on weekends will now tout, "Finance your mortgage with Countrywide, and have your identity stolen at the same time for mere pennies."
The recent arrest of a former Countrywide employee in the insider identity theft case, where an...
"Whitelisting" is a new twist on information security. Instead of trying to find a software solution that keeps all of the potential bad guys out of your systems, whitelisting allows you to establish a protection layer that grants access to only your finite list of good guys - individuals or applications.
In this...
In the wake of the arrests of 11 hackers tied to the TJX data breach, security experts everywhere are warning of bigger, bolder threats to come.
So, what should banking institutions have learned from TJX-style breaches, and what can they do now to protect their customers and critical financial/informational...
A former Countrywide Financial Corp. employee was arrested by the Federal Bureau of Investigation earlier this month in Los Angeles for stealing and selling sensitive personal information, including social security numbers on an estimated 2 million mortgage loan applicants from around the country for the last two...
Credit and debit card fraud: It's the threat that keeps growing and evolving.
A year ago, many banks and credit unions were forced to cancel and reissue thousands of cards as a result of the TJX breach. More recently, banks located in Indiana saw accounts breached from ATM or debit card transactions. Indiana law...
The Federal Deposit Insurance Corporation (FDIC) has made progress with its internal security controls, but still needs to make significant improvements to its security management practices.
This is the key finding of a recent report issued by the Government Accountability Office (GAO) in an audit of the banking...
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the discussion?
Not early enough, says Nalneesh Gaur of Diamond Management & Technology Consultants. In this interview,...
During March 2006, Mexican banking authorities established the use of a second factor authentication based on "dynamically generated information" -- in addition to username and password -- as a requirement for doing monetary operations through e-banking systems. This regulation allowed the use of one-time access code...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interview with Nalneesh Gaur, Chief Information Security Architect, Diamond Management & Technology Consultants
Mergers and acquisitions are a way of life for financial institutions, and so many pertinent business issues bubble up whenever an M&A is discussed.
But when does information security enter the...
Interview with David Jevans, Director, Anti-Phishing Working Group
Phishing, vishing, whaling - there are a growing number of electronic social engineering threats to unsuspecting consumers and their identities. Financial institutions and their customers increasingly are targets of these attacks. But they're also...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing covid19.inforisktoday.com, you agree to our use of cookies.