As regulation and litigation increase, internal investigators must support an alphabet soup of compliance obligations: SOX, GLBA, FISMA, HIPAA, PCI DSS, regional privacy laws, and more. Although each regulation is different, reflecting specific risks and markets, these laws share common investigation requirements in...
While we still use many of the same old names - viruses, Trojans, and worms - today's malware deserves much more respect than many are giving it. Where traditional viruses mostly aimed to disrupt operations or win fame for their coders' cleverness, today's malware enables potent multistage attacks called advanced...
In what is being called "the largest coordinated international law enforcement action in history directed at carding crimes," 24 suspects have been arrested in a fraud scheme likely involving more than 400,000 accounts.
The recent settlement between Village View Escrow and Professional Business Bank could set a new course for legal disputes involving account takeover, say the attorneys involved in the fraud case.
The banking industry has never seen such a fundamental change as mobile banking. Globally, millions of consumers are already using a wide array of mobile devices to conduct banking - and millions more are expected to go mobile in the coming months.
But with that growth come a whole new set of threats: mobile...
Hacktivist attacks are on the rise. So how should organizations respond? ISF researcher Gregory Nowak offers unique advice about the role communications plays when hacktivist threats emerge.
For United Bank & Trust, cost, efficiency and customer adoption were big considerations when it came to FFIEC conformance. How did this $1 billion institution determine the best authentication option?
When it comes to fighting financial fraud, Peter Tapling of Authentify says banking institutions are chronically underestimating and under-utilizing one key resource: Their own customers.
Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
This book provides an easy-to-understand introduction to protecting payment card data and a reference framework you can use as you work with architects, operations, analysts and assessors. This book covers not just the PCI DSS mandates themselves but also ways in which you can employ data protection techniques to...
Thales e-Security is pleased to present the 2011 Encryption Trends Study (United States) conducted by the Ponemon Institute. This study reveals how U.S. organizations are using encryption to protect their sensitive data and how the U.S. compares itself with other countries like Germany, United Kingdom, Brazil and...
"This is about preparing the battlefield for another type of covert action," a former high-ranking U.S. intelligence official says. "Cyber collection against the Iranian program is way further down the road than this."
The out-of-court settlement reached in a dispute between Village View Escrow and Professional Business Bank shows it's getting more difficult for banks to avoid liability, experts say.
Online banking attacks are up, but financial losses linked to account takeovers are down. What does this shift say about the future of fighting ACH/wire fraud? The FS-ISAC's Bill Nelson weighs in.
A lingering legal dispute over a corporate account takeover incident at escrow company Village View has finally come to a close. Find out more about the details of the case and the settlement.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.