Unmistakably, the release of the FFIEC supplement was the result of an increasingly hostile online banking environment created by the introduction of advanced malware. To effectively comply with FFIEC guidelines, financial organizations need to select a solution that is able to provide real-time threat intelligence...
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
RSA, PhoneFactor and Rapid7 were among the organizations to issue product/solution news releases at RSA Conference 2012 on Tuesday, Feb. 28. See the latest announcements from the show.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
What are the top emerging fraud threats to banking institutions via mobile banking, and how must security leaders respond? Julie McNelley of the Aite Group offers tips for fighting the newest threats.
It's been more than 10 years since enactment of the Gramm-Leach-Bliley Act (GLBA). But the fundamental security tenets of GLBA are just as relevant today - especially as banking institutions look to conform to the recently released FFIEC supplement, "Authentication in an Internet Banking Environment."
Join banking...
As bank examiners begin applying the updated FFIEC Authentication Guidance, many financial institutions will find that their current security practices do not stand up against the strengthened requirements. Arm yourself with the knowledge you need to begin shoring up your authentication controls before your next bank...
As part of the updated FFIEC Authentication Guidance, U.S. banking regulators mandate that financial institutions conduct periodic risk assessments of their electronic banking services.
But in the face of evolving threats, a growing online customer base and emerging mobile technology, what is the most effective...
An estimated 650,000 customers have recently switched from big banks to community banks and credit unions. But are these smaller institutions prepared for the new demand for security and fraud prevention?
What fraud and security issues does Paul Smocer, the new president of BITS, see as being top concerns in the coming year? Mobile payments, social media, and a strong need for institutions and organizations to comply with existing guidance top the list.
Within the FFIEC Authentication Guidance, one provision - strong authentication - stands out as an opportunity to make security conveniently visible to customers. Join two banking security thought-leaders and a solution provider for insights on:
How to satisfy a crucial FFIEC mandate within the overall layered...
Since the summer of 2009, financial institutions and their corporate customers have been defrauded by increased incidents of account takeover. These incidents have pitted banks and customers against one another in court, and they were a key impetus behind the release of the new FFIEC Authentication Guidance. So, how...
Fraud is winning in the fight against cybercrime. Why? Because financial institutions continue to rely on ineffective technology and controls, says fraud analyst Tom Wills says.
Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them to detect and...
Today, financial institutions offering internet-based and mobile-banking services face increasing pressure to provide enhanced consumer protection against phishing, sophisticated malware and other fraudulent activities. The FFIEC's guidance for financial institutions took a strong stance in support of the deployment...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.