Upticks in fraud perpetrated through mobile banking and mobile payments are a growing concern for regulators, says David Lott of the Federal Reserve Bank of Atlanta, who explains ongoing security initiatives.
Nine compelling threats will make securing IT more challenging than ever over the next two years, says Steve Durbin, managing director of the Information Security Forum.
Despite high-profile attacks and publicity, advanced persistent threats continue to strike organizations in all sectors. How can security leaders improve defenses? ThreatTrack's Usman Choudhary offers advice.
The way enterprises address information security will play an increasingly critical role in how cyber-insurance providers determine coverage and pricing, insurance experts told members of Congress at a recent hearing.
As data breaches continue to multiply, employers must not overlook how intrusions could lead to the theft of employees' identities, paving the way for fraud, says ID theft expert Johnny May. He will keynote the March 24 Fraud Summit Atlanta.
When Todd Davis helped found LifeLock in 2005, ID fraud was a niche consumer issue. Today it's a major enterprise risk. What are today's top fraud threats, and where are some of the surprising security gaps?
During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
When IT veteran Branden Spikes founded his own company devoted to isolating browsers from attacks, he thought building the technology would be the top challenge. The venture capital community proved him wrong.
ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater.
The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks.
Chris Buse, CISO for the state of Minnesota, says centralizing IT systems should make it easier to defend against cyber-attacks because there are fewer computing environments to protect.
Financial crimes, fraud and cybersecurity. These topics are quickly converging upon security organizations, and leaders must be prepared. FICO's Stuart Wells discusses the tools and skills needed for convergence.
This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James.
Were DDoS attacks against major American banks in 2012 waged in retribution for U.S. government actions? A recently leaked top-secret memo prepared in 2013 for Keith Alexander, who was then NSA director, seems to confirm that's the case.
Information sharing and analysis organizations being formed under President Obama's new executive order must avoid becoming silos that only share cyberthreat intelligence "within their own walls," warns Deborah Kobza, executive director of NH-ISAC.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.