A new Bank of England cybersecurity risk framework proves how forward-thinking U.K. regulators are when it comes to cybersecurity, says Gartner's Avivah Litan. Learn what security experts say the U.S. can learn from British effort.
Microsoft moves to quash a search warrant granting U.S. investigators the right to request copies of an overseas customer's e-mails that are stored in a data center in Ireland.
Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.
Restaurant chain P.F. Chang's China Bistro says it's investigating a possible payments breach that has been linked to fraud. Card issuers say the compromise could date back to March.
In the wake of its massive data breach, Target Corp. has hired as its first CISO an executive with information security leadership experience at two of the nation's largest corporations.
A second economic espionage campaign has been tied to a Chinese military hacking team. But does that attribution help businesses, or just highlight security firms battling for government cybersecurity spending?
A new voluntary cybersecurity framework from the Bank of England is designed to help financial institutions in the U.K. identify vulnerable areas that could be exploited by a cyber-attack. Find out the details of the new program.
When NIST issued "Guidelines on Cell Phone Forensics" in May 2007, Apple's introduction of the iPhone was a month away. Seven years later, NIST is revising its guidance and giving it a new moniker, "Guidelines on Mobile Device Forensics."
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
"Banks can play offense, to use mobile in a justifiable way to engage customers into their security," says Jim Van Dyke of Javelin Strategy & Research. He outlines a strategy for using mobile devices to enhance fraud detection.
European officials have been accused of punting the difficult decision of exactly how search engines should "forget" people's personal data, even as Google daily now receives 10,000 such requests.
Imagine a cyber-attack that disables an electricity distribution center. What's the role of the U.S. military, government or the utility company in defending and retaliating? That's a question on the mind of Army Col. Gregory Conti.
Paul Smocer of BITS explains why banking institutions, which face increasing cyberthreats, need to put the NIST Cybersecurity Framework to use, and why third parties should prepare for more regulatory scrutiny of their security practices.
The British government aims to increase uptake of five essential security controls at U.K. businesses, backed by third-party annual audits and a badge of compliance. Many government contractors must comply.
The Financial Stability Oversight Council says banking regulators need to ensure institutions are expanding their cyber-intelligence sharing and third-party oversight as attacks against the financial infrastructure mount.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.