Provisions of the bill would help develop a skilled government infosec workforce, prioritize federal cybersecurity R&D, improve the transfer of cybersecurity technologies to business and promote cybersecurity education and awareness.
Interview with James Van Dyke of Javelin Strategy & Research
Identity fraud crimes expanded at a 12% rate in 2009. What can we expect to see in 2010?
Javelin Strategy & Research is out with its latest Identity Fraud Study. For insight on the study results and what they mean to organizations across industry,...
Dena Haritos Tsamitis has an ambitious goal for the year: to improve cyber awareness among 10 million people globally.
The Director of Education, Training and Outreach at Carnegie Mellon University's CyLab, Dena discusses:
The cyber awareness challenge among people of all ages;
Effective techniques for...
What are the top fraud trends facing financial institutions in 2010?
Gartner's Avivah Litan shares her insights in an exclusive interview with Information Security Media Group's Linda McGlasson, discussing:
Increased number of attacks on strong authentication;
How to handle ACH fraud;
The biggest security...
I'm excited about today's launch of the 2010 Banking Information Security Today Survey, and you should be, too.
Think about it: Identity theft, fraud, regulatory compliance, vendor management, security awareness, risk management, privacy. These topics have no industry loyalty; they're common to all public and...
President Obama this past week made strong remarks to spur Congress and populist support toward banking regulatory reform.
But what's likely to happen? And when?
Christie Sciacca, formerly with the Federal Deposit Insurance Corporation, discusses:
The substance of Obama's proposals;
What's likely to occur in...
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
Passwords are the bane of my existence -- probably yours, too. In order to be a good, secure, computer and Internet user, ideally I should have a different password for every single application I use, website I register to, and place I visit on the Internet. I frequently have at least 10 to 15 different passwords and...
In the wake of major security incidents such as the Heartland Payment Systems data breach, critics have focused on the perceived flaws of the Payment Card Industry Data Security Standard (PCI) and the role of qualified security assessors (QSAs).
Following are five myths and realities detailed by PCI compliance...
The Payment Card Industry Data Security Standard (PCI) is one of the hottest topics in information security today. And PCI Quality Security Assessors (QSAs) are among the most sought-after of security professionals.
What, then, does it take to become a QSA?
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
The U.S. Secret Service has broken up an alleged ring of ATM skimmers in Massachusetts, announcing the arrests of three suspects -- including one man who was in possession of nearly $100,000 when he was arrested.