Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
What are the new year's top trends in banking, payments and security?
Javelin Strategy & Research has just released its Top 10 Trends report for 2010. James VanDyke, president of Javelin, discusses:
Top headlines from the new report;
Biggest threats to banks, payments and security;
The "next big thing" in...
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
2010 is the Chinese year of the tiger - a fitting image for banking/security leaders that must be vigilant against the information security threats that challenge financial institutions and their customers.
To prepare for this New Year, we've prepared a Banking/Security Agenda that looks at fraud, regulatory...
This is the last thing you'd want during the holiday season.
I lost my purse at a local movie theater recently, and within a couple hours realized my loss. Nervously, I rushed to the customer service department, all the while hoping to get my grey tote bag handed safely from underneath the counter.
If you thought 2009 was a tough year in terms of regulatory scrutiny, wait until 2010.
With regulatory reform and consumer protection high on the agenda, financial institutions should face new pressures on several fronts, say industry observers.
Here are the top regulatory issues for banking institutions to...
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
There are a number of new regulatory compliance and security initiatives that mean changes for financial institutions.
But do these changes also open the doors to potential fraudsters?
Kris VanBeek, SVP of Information Systems at Digital Federal Credit Union, discusses:
How some of these changes might attract...
Twitter, Facebook and LinkedIn are among the top social media sites on the Internet - and they're all part of a new movement of immediate, instantaneous communication among an organization's employees and with its customers.
In the blink of an eye - or at the speed of a tweet -- people around the globe can send...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Government and business must think creatively to help safeguard America's digital assets, says Melissa Hathaway, the former White House acting senior director for cybersecurity who led President Obama's 60-day cybersecurity policy review.
Hathaway, an interview with GovInfoSecurity.com, cited the innovative...
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...