The FFIEC Authentication Guidance update has been in circulation since mid-2011. But as banking examiners begin testing for conformance, we find:
Only 11% of surveyed institutions have come into conformance since the guidance was issued;
Nearly 30% don't fully understand the guidance;
88% do not believe the...
Hacking is behind most large-scale data breaches. What steps can organizations and leaders take to safeguard their information post-attack? Karen Barney of the Identity Theft Resource Center offers advice.
Everyone knows that banking is a key target for cyber criminals - that's where the money is. But traditionally it has been the big financial organizations that were the target. In 2010, smaller financial institutions became targets through account takeovers, attacks which caused a surge in stolen online banking...
BITS, the technology division of the Financial Services Roundtable, has tapped Diane Ness to lead its fraud-reduction program. What void does this new leader fill, and how will she help banks fight fraud?
Unmistakably, the release of the FFIEC supplement was the result of an increasingly hostile online banking environment created by the introduction of advanced malware. To effectively comply with FFIEC guidelines, financial organizations need to select a solution that is able to provide real-time threat intelligence...
Increased use of mobile devices and social networking sites is feeding ID theft and fraud. What is the risky behavior that is to blame for the rise in ID fraud? A new study sheds light.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
Most breaches have a link to an insider, but security leaders continually fail to recognize the signs. Why do organizations miss the obvious risks, and what can they do to improve their tactics?
In the PATCO Construction fraud case, attorney David Navetta says the court failed to address two key concerns: reasonable security and good faith. What's next in PATCO's ongoing legal battle?
How effective will the Domain-based Message Authentication, Reporting & Conformance initiative be at curbing phishing attacks? Security experts at RSA Conference 2012 weigh in.
Banking regulators have begun examining institutions for conformance to the FFIEC Authentication Guidance. What gaps have they found? Terry Austin of Guardian Analytics offers insight and security tips.
Cybercrime has evolved to become a global business - except fraudsters are looking not for return on investment, but return on hacking, says Sam Curry of RSA. How can organizations respond?
Today's cyber-culture causes financial institutions to rely heavily on the use of electronic information, which can be a gold mine for hackers. Malicious individuals are constantly searching for security vulnerabilities and weaknesses to gain access to electronic information. Are you taking the proper steps to protect...
The book provides information security leaders tips to identify insiders who can cause damage to information systems and data and guidelines on protecting their organizations from such individuals.
Device identification. Anomaly detection. Transaction verification. When it comes to fraud prevention, there are nearly as many options as there are threats. So, how do you best prioritize your own investments in anti-fraud solutions?
Join this panel of experts, led by financial fraud expert George Tubin, as they...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.