More organizations are looking to "continuous security" to monitor their ever-expanding network perimeters. But what are the critical elements of effectively using this approach?
You need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers and other high-level positions. Here's how privacy can help.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.
Financial Institutions already apply out-of-band security in many instances. The challenge is: How do we help protect payment cards when they are used at any number of online and brick-and-mortar retailers?
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
Here's an argument for why recent indictments linked to what's been called the largest-ever card fraud scam won't deter fraud - and why improved security is a better deterrent.
Electronic banking fraud is as rampant as ever because of the failure to address one of the core problems, says security specialist Tom Wills, who describes why focusing only on technology to defeat Trojans will never work.
Reports continue to show that an overwhelming percentage of applications have serious vulnerabilities. The important takeaway here is that application security has not improved in the last 10 years.
Improving collaboration among employees is the goal of Yahoo CEO Marissa Mayer's decision to ban telecommuting, but her edict means better information security as well, writes veteran CISO Patricia Titus.
The OWASP Top Ten list of security risks was created more than a decade ago to be the start of an industry standard that could bootstrap the legal system into encouraging more secure software. Here are the 2013 updates.
The FTC puts the onus on application developers to protect their organization's sensitive data by mandating the use of "reasonable" data security practices. What does this mandate mean in practice?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.