Earlier this week, I blogged on what have been the most popular interviews I've conducted in 2009 - and there have been a lot of them.
Today I'd like to talk about my favorite interviews of the year. And there have been a magnificent seven of those.
The 10 most significant events regarding government cybersecurity in 2009 saw its genesis with the inauguration of a Blackberry-toting chief executive, the most tech-savvy president to occupy the Oval Office.
This is always a fun exercise.
I spent some time today looking back over all the articles we published (so far) in 2009.
And that number is 891, by the way - an average of just over 17 per week, or three-plus per weekday. But the number that concerned me most is 10 - what have been the top 10 most popular stories...
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
This is the last thing you'd want during the holiday season.
I lost my purse at a local movie theater recently, and within a couple hours realized my loss. Nervously, I rushed to the customer service department, all the while hoping to get my grey tote bag handed safely from underneath the counter.
If you thought 2009 was a tough year in terms of regulatory scrutiny, wait until 2010.
With regulatory reform and consumer protection high on the agenda, financial institutions should face new pressures on several fronts, say industry observers.
Here are the top regulatory issues for banking institutions to...
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
Was Citibank breached by hackers who siphoned tens of millions of dollars from the bank's customers?
The Wall Street Journal on Tuesday reported news of an FBI investigation into an alleged Citibank computer security breach by hackers linked to a Russian cyber gang.
Citigroup executives, however, categorically...
It's been over one year now since banking regulators began examining institutions for compliance with the Identity Theft Red Flags Rule. What have been the common deficiencies, and what will examiners be expecting in year two?
Jeff Kopchik, senior policy analyst with the Federal Deposit Insurance Corporation...
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Seven banks were closed by state and federal regulators on Friday, Dec. 18, including four institutions of more than $1 billion in assets under management. The largest of the failures was First Federal Bank of California, a $6.1 billion bank, which subsequently was taken over by OneWest Bank of Pasadena, CA.
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...