Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
The potential of governments messing with commercial IT security products - think China and the NSA - means organizations need to improve lines of communications to assure the integrity of the IT wares they acquire. ISF's Steve Durbin discusses mitigating supply-chain risk.
Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
President Obama met with technology company executives critical of his administration's surveillance program a day after a federal judge ruled that portions of the National Security Agency program could be unconstitutional.
Cybersecurity risks posed by inadequate IAM and IT asset management are mounting. Now the National Cybersecurity Center of Excellence has drafted guidance to address banking institutions' unique risks, says Nate Lesser, the center's deputy director.
The final version of the FFIEC's guidance on social media use clarifies how banks should assess consumer and third-party risks. But suggested controls for employee risks are still missing.
A Senate committee will soon consider a patent reform measure that is less aggressive than a recently approved House bill designed to help stem the tide of patent infringement lawsuits that sometimes target security technologies.
In the wake of a surge of lawsuits, bipartisan Congressional support is building for a measure designed to help protect banking institutions from frivolous patent infringement claims, says NAFCU's Brad Thaler.
Federal investigators announced five more arrests this week in connection with a $45 million ATM cash-out and prepaid card fraud scheme. Learn why experts expect these types of crimes to become even more common.
For risk managers, an often overlooked step for minimizing supply chain risks is to continually monitor outsourcers and other third parties to address critical security issues, says the Information Security Forum's Steve Durbin.
The breach of a card loyalty marketing company that exposed card data and other personally identifiable information illustrates the privacy vulnerabilities third parties pose, experts say.
As efforts to fix technical glitches on the HealthCare.gov website for Obamacare continue, taking steps to ensure security should be a top priority. Otherwise, efforts to build trust in the system will fail.
Tony Trenkle is stepping down as CIO at the Centers for Medicare and Medicaid Services as the troubled HealthCare.gov website for Obamacare continues to undergo major technical fixes.
The Office of the Comptroller of the Currency is the first major U.S. banking regulator to issue updated guidance on third-party risks. What are the key tenets, and what should institutions expect next?
Organizations should make sure their business continuity plans address all key business processes and customer-facing applications, says Dan Shannon of core processor Fidelity Information Services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.