Despite the proliferation of social networks and messaging apps, email remains the primary means of communication today. Unfortunately, it also remains a persistent threat vector for cybersecurity abuse. We see these evil emails everywhere: at work, at home and in the news, attempting to sell something, or steal...
This monthly Security Agenda will highlight some of the most recent additions to our course library. April's edition features Visa's SVP Risk Services, Margaret Reid discussing how to keep CNP fraud at Bay. Other industry influencers like University of Michigan's Kevin Fu, Target's Chief Information Security Manager,...
Any organization that deals with credit card information must secure payment card data in accordance with PCI standards.
Merchants and service providers are required to validate compliance by assessing their environment against 12 major control categories applicable to applications and data in the data center and the...
Easy Solutions' Ricardo Villadiego addresses how the digital revolution, millennials and the widespread use of online communications affect financial fraud.
In this transcript from his video interview at RSA Conference 2017, Villadiego:
Explains why banks are not proactive when it comes to fraud protection;...
Data breaches feed the market for fraudsters to steal identities, which challenges traditional approaches to identifying the genuine from the fraudster. We hear that knowledge-based authentication is dead. But trust in any single defense is flawed. No single route to "trust" should be applied. We should never lose...
Forty-seven percent of survey respondents rate their organizations at above average or superior when it comes to provisioning, managing and attesting to identities and access to secured resources within their networks.
And yet ...
50 percent either know their organizations were breached in the past year, or they...
Along with DNS, digital keys and certificates are at the foundation of any layered cybersecurity defense. Moreover, keys and certificates are akin to HLAs (Human Leukocyte Antigens) because they serve as unique identifiers giving authorized users access to encrypted systems.
But vulnerabilities, such as Heartbleed...
Nearly every major breach over the last three years - including Anthem, Target, Home Depot, Office of Personnel Management, the Internal Revenue Service, the National Security Agency - shared a crucial commonality: attackers gained entry using compromised or stolen credentials.
This range of identity-centric...
What's your digital identity strategy? Numerous agencies in countries across Europe - such as the Italian postal service - are creating new approaches to verifying identities and allowing them to be used as a trusted service, says CA's Paul Briault.
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
The identity world circa 2015 still operates in stovepipes -- mobile, API, and web identities are often managed and secured using separate processes and technologies. The holy grail for the future of identity is a single standards-based federated Identity and Access Management (IAM) system with a high degree of...
Customers increasingly use digital channels to interact with organizations. But these interactions raise new security concerns that must be addressed by IAM solutions, says David Gormley of CA Technologies.
Fraud Summit - San Francisco 2014 - The hackers get the headlines, but behind the scenes the stealthy insiders continue to pose huge fraud risks to banking institutions. And often the fraudsters are senior, trusted employees with privileged access to accounts and competitive data. Register for this session to learn...
In the face of evolving threats and actors, traditional ID security strategies have been proven inadequate, says Entrust's David Rockvam. It's time for a security evolution.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.