A grand jury indicts a former Transportation Security Administration data analyst who was told he was about to lose his job with trying to damage a computer used to screen terrorists.
Ghosts of Crimes Past and Present Will Haunt the Future of Banking Institutions and Customers
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were hit from every angle with...
"We're trying to hire anyone with pulse and got some knowledge of technology component needed to build this," the head of the Cloud Security Alliance quotes cloud computing services providers.
I'm sorry, but weren't we just celebrating the holidays?
Unbelievable how fast the New Year has flown by already. It seems like we're all trying to get 12 months worth of work done in one.
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
The unauthorized publishing on a government website last May of a document revealing information on civilian nuclear sites was the shared fault of all of the agencies involved in creating it, the Government Accountability Office reports.
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
While external threats to corporate data have made headlines, an even greater threat is posed by company employees. Sometimes, employees accidently expose sensitive data to the public by losing valuable data stored on a USB drive or laptop that is lost or stolen. At other times, disgruntled laid-off employees may...
Confidential Ethics panel report exposes probe of 30+ representatives. We really need a cultural change in the way Americans practice computer hygiene.
The targets are getting bigger, the fraudsters bolder, and we all have a whole lot more at stake to lose.
This is the message from Mary Monahan, Managing Partner and Research Director at Javelin Strategy & Research. In a discussion of current data breach trends, Monahan touches upon:
How breaches in 2009 are...
Do you truly know who's accessing your critical information systems?
The Heartland data breach and Countrywide insider crime remind us: These systems are vulnerable to malicious attacks from outside and within the institution.
And recent consolidations and mergers within the industry also underscore the...
The Heartland Payment Systems (HPY) data breach came as an unpleasant surprise to many financial institutions and their customers in early 2009. What are the threats we should eye as we look ahead to 2010?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.