It is an age old question: Who really is in charge of security? A look back into history, one can see the origination of the word "password" and how it came from the guard at the gate of a city or castle, who upon approached, would say "Halt, who goes there?"
OK, so how many payment processor data breaches are we talking about - one or two? That's been the big question we've been trying to sort out this week. And I'm not sure anyone knows definitively. If they do, they're not telling.
The numbers are staggering as we try to get a handle on exactly how many institutions, cards and customers have been affected by the Heartland breach.
One single institution's report of the number of cards compromised by the Heartland Payment Systems (HPY) data breach - 10,000.
Stupid robbery attempts are always funny, but when they happen in your backyard, well, they're even funnier.
A few weeks back, near my home in New Hampshire, a would-be robber held up a local Citizens Bank branch, and he attempted to get away with an undisclosed amount of cash.
The Interagency Guidelines Establishing Information Security Standards as per Gramm-Leach-Bliley Act (GLBA) of 2001 require each bank to have a comprehensive written information security program that includes administrative, technical, and physical safeguards appropriate to the size and complexity of the bank and the...
This publication is not from one of the Federal or State Banking Agencies, but given our extremely diverse audience, this will be of interest to organizations and individuals responsible for developing and maintaining security plans and programs.
The objective of system security planning is to improve protection of...