Marcus Ranum isn't shy about saying online authentication methods are outdated and insecure. Passwords will get breached, but organizations can do more to protect their users and online databases.
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
From smart phones to tablets, laptops to USB devices, consumer technologies are ubiquitous in the workplace - and so is the 'bring-your-own-device' (BYOD) practice of allowing employees to conduct work on their own personal electronics.
But how do these consumer technologies change organizations' approaches to...
When it comes to employee-owned mobile devices, many organizations want to run away from the security risks of the bring-your-own-device-to-work trend. Intel chose to run toward them.
In an exclusive case study, Intel CISO Malcolm Harkins details the security challenges and business opportunities of BYOD. And he...
It's no longer just about mobile banking. Mobile technology today is deployed by leading-edge institutions for out-of-band user authentication, transaction verification and to help prevent fraud via real-time security alerts.
How can your institution crack down on fraud and maximize its mobile investment?
Join...
As part of the updated FFIEC Authentication Guidance, U.S. banking regulators mandate that financial institutions conduct periodic risk assessments of their electronic banking services.
But in the face of evolving threats, a growing online customer base and emerging mobile technology, what is the most effective...
We all know the online shopping risks consumers face on CyberMonday. But how does the BYOD mobile computing trend impact risks to organizations from their own employees shopping on the job?
Mobile devices have forced a radical shift in the way organizations service their customers. Financial institutions are no exception to the pressure of extending their online services to the mobile channel. By 2015 mobile banking could reach one in five adults in the United States. But the growth in mobile devices has...
The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust. This is the premise of Mike Ozburn, Principal at Booz Allen Hamilton, which has just authored a new white paper about these pillars.
Cybersecurity Coordinator Howard Schmidt unveils a White House blueprint to create an online environment where people and business can complete transactions in confidence.
Second in a Series of New Roundtable Events Showcasing Emerging Technologies...
Hear about emerging trends in banking enterprise access management;
Find out how employee access management and authentication can be improved with emerging technologies and new functionalities;
Learn how to reduce your vulnerability...
Learn about the latest findings on the impact of identity fraud on your financial institution and your customers:
Why banking customers are shying away from the online banking channel
How stolen identities are used to defraud your customers and damage your brand
Which banking channels are most vulnerable to...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.