No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
Mobile security is a new discussion track at RSA Conference, but it's long been a hot topic for CISOs. Entrust's Dave Rockvam discusses BYOD and how organizations are securing personally-owned devices.
Effective investigation techniques for now and for the future
Mobile devices are pervading everyday transactions, giving criminals increasing chances to exploit users' and organisations' vulnerabilities. Device data can be the key for crime investigators, who, by looking outside of the device for answers, can...
IT security practitioners who employ the RSA public-private key cryptography needn't lose sleep about its efficacy, despite new research that raises questions on how it creates large prime numbers to generate secret keys, IT security authority Gene Spafford says.
"The role of expert witness will only become more critical as our dependency on electronic data increases," says Eric Cole, who offers tips on how to pursue these opportunities.
RSA Chief Technologist Sam Curry defends the company's approach to public-key cryptography after researchers suggest a flaw in its encryption algorithm, contending the problem exists elsewhere in the security chain.
Where was the weak link in the payments chain that led to the recent credit card data breach impacting Bank of America customers? A bank spokesperson offers new details about the possible compromise.
Going to RSA Conference? Don't miss ISMG's presentations on cloud security and the faces of fraud. Also, ISMG editors will host a meet & greet reception on Tuesday at the event. Click for details.
What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.
What are the top emerging fraud threats via mobile banking, and how must security leaders respond? In an RSA Conference preview, Julie McNelley of the Aite Group offers tips for fighting the newest threats.
As banking institutions work to conform to the FFIEC Authentication Guidance, they're overlooking one huge gap. What are fraud expert George Tubin's tips to ensure both conformance and security?
Trusteer has been protecting customers against cybercrime since 2006. Based on our accumulated experience with hundreds of customers and millions of protected endpoints, we have created a framework that includes 7 key requirements for selecting a cybercrime prevention solution.
This document highlights:
Why...
Malware has become the primary attack tool used by cybercriminals to execute account takeover and initiate fraudulent transactions, and has been able to stay undetected by most security controls implemented by financial institutions. By preventing anomalous transactions generated by malware-infected machines,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.