The consumerization of IT and the popularity of BYOD are jeopardizing the security and integrity of enterprise data. Seeking an easy way to share files across smart phones, tablets, and desktops, employees are using free public cloud file sharing services that lack rigorous security and audit controls. These services...
The cost of a data breach or privacy violation goes far beyond compromised records to include hard-dollar expenditures for breach notification, credit monitoring, regulatory fines and legal fees. Not to mention the immeasurable cost of reputation loss.
To avoid these losses, security leaders are increasingly...
Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
A new study says, on average, it takes 87 days to first recognize that insider fraud has occurred. Why the delay? Researcher Larry Ponemon and Christine Meyers of Attachmate Luminet discuss the findings.
The big, external breaches get the headlines, but the insider crimes are doing significant financial damage, says Tim Ryan of Kroll Advisory Solutions. How can organizations address the insider threat?
Organizations typically secure data where it resides and is transmitted. Data-centric security strategies focus on securing the data itself. Mark Bower of Voltage Security explains.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
The massive growth of data within today's enterprise overwhelms traditional security controls. How can organizations inventory, manage and secure Big Data at every stage of its lifecycle? How can they turn the security challenge into a security advantage? Join this panel of experts for a discussion of Big Data and...
From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
Organizations want the efficiencies of cloud computing. But they still worry about availability and security of data in the cloud. CSC's Andy Purdy offers insight into easing cloud security concerns.
Smart phones, laptops, tablet PCs, optical discs and USB devices. There are many new mobile devices and emerging technologies to help today's professionals do their jobs in any location - and increasingly private business is being conducted on personal digital and storage devices. Yet, these technologies create new...
The FFIEC has issued a revised guidance to require banks to better protect customers and the movement of funds when banking online. However, this is a daunting task: interpreting the guidance, determining what risks are present, how to protect customers, and who can help you with that process, etc. To cut through...
Smartphones are ubiquitous in organizations across industry today. But how secure are these devices -- and what security and liability vulnerabilities do they expose?
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.