The Target breach. Account takeover. Mobile banking. Big data analytics. If these terms mean anything to you, then stop right now and give some thought to attending our Fraud Summit in San Francisco on April 29.
There's a ton of event content to choose from at Infosecurity Europe 2014, which runs from April 29 through May 1, and here are some of the sessions that caught one editor's eye.
An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.
Watch this 6-minute video highlighting what the global leader in strong authentication, RSA, has done over the years and continues to do to maintain the number-one spot in the security industry.
Speculation surrounding the cause of the disappearance of Malaysia Airlines Flight 370 hasn't included the possibility of a cyber-attack. But one cybersecurity expert contends hacking an airliner is feasible.
Two Stanford University researchers are conducting a study using crowdsourcing to show that the NSA's culling of telephone metadata can reveal a lot about an individual. I joined the crowd to find out what the metadata says about me.
Although adoption of mobile banking is accelerating, mobile payments have yet to reach a tipping point and security issues need to be addressed, says Marc Warshawsky of Bank of America, a mobile banking pioneer.
If Congress fails to enact a national breach notification law, the Obama administration could develop a set of voluntary best practices along the lines of its new cybersecurity framework.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
As content sharing via mobile devices becomes more common, organizations must make sure security issues are adequately addressed, says Hormazd Romer, senior director of product marketing at Accellion.
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Among the biggest cyberthreats enterprises face comes from hacks on consumer mobile devices, says Caleb Barlow, a director of product management at IBM Security.
Bring-your-own-device concerns are getting more complex, but most organizations aren't keeping up with the times, and their outdated policies and procedures prove it, says John Whaley of Moka5.
In a groundbreaking effort to boost security, HSBC Bank USA is now requiring its retail banking customers to use dual-factor authentication for certain sensitive online banking transactions, says LuAnne Kingston, senior vice president.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.