- April 14, 2009
Upheaval in the financial-services industry has put the spotlight on financial information security. Experts share ways to keep sensitive information secure during an M&A.
- April 07, 2009
Industry consortium launches effort to see how biometrics could improve customer authentication and battle identity theft. Analyst says iris scanning at ATMs holds potential.
- April 02, 2009
Student loan guarantor deploys data masking technology to secure sensitive information used in development and testing.
- March 18, 2009
Company issued a security update after criminals attacked its Windows-based ATMs in Russia and installed malware.
- March 16, 2009
Evaluating service provider controls can take a lot of time and effort, but the Shared Assessments program aims to give financial institutions and other organizations a way to streamline...
Sponsored by DellEMC - Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More
Sponsored by DellEMC - Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More
Sponsored by DellEMC - Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More
Sponsored by DellEMC - If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More
- March 16, 2009
Breaches prompt Visa to remove payment processors from its list of PCI-compliant service providers.
- March 05, 2009
Survey finds victims of financial fraud more likely to change their shopping and payment behavior, including their choice of bank.
- March 03, 2009
Panda Security report examines increasingly sophisticated malware that aims to steal banking credentials.
- March 02, 2009
Visa statement counters reports that a second payment processor was compromised.
- February 27, 2009
Bank uses email encryption to securely exchange confidential information with commercial customers.
- February 24, 2009
Heartland CEO Robert Carr said the company still can't reasonably estimate the potential impact of the data breach on its day-to-day operations.
- February 23, 2009
The Pennsylvania Credit Union Association and the Tuscaloosa, Ala. VA Federal Credit Union warn of a new payment processor data security breach.
- February 13, 2009
Trio arrested in Florida after allegedly using stolen credit card numbers for purchases at local Wal-Marts, officials said.
- February 11, 2009
Data protection, information leakage and identity and access management were a top priority for financial industry CISOs, according to a new survey.
- February 10, 2009
Research firm says the number of identity fraud victims increased last year but early detection cut consumer losses.