Worldwide, banking institutions face evolving fraud threats. What are some of the new strategies and solutions they employ to fight back? ACI Worldwide's Patrick Higgins and Andy Morris share insights.
Delaware Chief Security Officer Elayne Starkey leads, but does not supervise, hundreds of information security officers, many of whom have technical expertise in areas other than security.
NIST's Ron Ross, one of the world's top information risk thought leaders, says new guidance he co-wrote doesn't dictate how organizations must approach risk assessment, but gives enterprises options on how to conduct risk appraisals.
Five pilot projects unveiled by the U.S. federal government, if successful, should build trust in online commerce, helping to boost the economy and create new career opportunities, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.
The information security threat landscape has evolved considerably over the past six years, and it's time that organizations' defenses evolve to match them, says Tom Kellermann of Trend Micro.
William Henley of the FDIC has just returned to banking regulation after a two-year stint working in the private sector. How did his business experience influence his approach to enforcing compliance?
The PCI Council has released a new certification program aimed at training employees, not companies. What makes this program unique, and why is the council coming out with it now? Bob Russo explains.
To address the security and privacy challenges magnified by the velocity, volume and variety of big data, the Cloud Security Alliance has formed a big data working group. What are the group's objectives?
Which employees are most apt to commit cyberfraud, and how can organizations detect and prevent their crimes? Researcher Randy Trzeciak shares insights and tips from a new insider threat study.
Charles Intriago isn't shy about sharing his opinions. As he reflects on the sanctions against Standard Chartered Bank, he says banks won't reform until regulators send violators to prison.
As Tropical Storm Isaac strikes, many organizations still sting from the impact of Hurricane Irene and 2011's other natural disasters. What lessons were learned, and how can they be applied now?
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
E-mail, IM, text messaging - we all increasingly depend on messaging technologies. And so do the fraudsters. Craig Spiezle of the Online Trust Alliance discusses how to mitigate our vulnerabilities.
By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.