- April 22, 2009
Finjan researchers discovered a botnet of 1.9 million compromised computers at banks, government agencies and other organizations.
- April 14, 2009
Upheaval in the financial-services industry has put the spotlight on financial information security. Experts share ways to keep sensitive information secure during an M&A.
- April 07, 2009
Industry consortium launches effort to see how biometrics could improve customer authentication and battle identity theft. Analyst says iris scanning at ATMs holds potential.
- April 02, 2009
Student loan guarantor deploys data masking technology to secure sensitive information used in development and testing.
- March 18, 2009
Company issued a security update after criminals attacked its Windows-based ATMs in Russia and installed malware.
Sponsored by IBM - What you don’t know about your apps can hurt you—costing you time, money and productivity. With the right UEM solution, you can use AI to gain actionable insight into app usage, performance and security to quickly and easily get your apps in gear. See More
Sponsored by IBM - May 25, 2018 has passed, but that doesn’t mean your GDPR work is done. Compliance demands constant vigilance, particularly for endpoints and mobile devices. Learn why UEM is the modern approach to meeting ongoing compliance requirements. See More
Sponsored by IBM - Imagine a way to configure and enforce policies for all endpoints, guided by AI, real-time analytics and best practices from your industry and peer usage. Imagine no longer. With the right UEM solution, you can do all of that—and much more. See More
Sponsored by IBM - Ruggedized devices have unique characteristics, but they still need to be managed, secured, tracked and updated—same as other endpoints. With UEM you can simply and securely manage all devices using the same platform. Here’s what to look for. See More
- March 16, 2009
Breaches prompt Visa to remove payment processors from its list of PCI-compliant service providers.
- March 16, 2009
Evaluating service provider controls can take a lot of time and effort, but the Shared Assessments program aims to give financial institutions and other organizations a way to streamline...
- March 05, 2009
Survey finds victims of financial fraud more likely to change their shopping and payment behavior, including their choice of bank.
- March 03, 2009
Panda Security report examines increasingly sophisticated malware that aims to steal banking credentials.
- March 02, 2009
Visa statement counters reports that a second payment processor was compromised.
- February 27, 2009
Bank uses email encryption to securely exchange confidential information with commercial customers.
- February 24, 2009
Heartland CEO Robert Carr said the company still can't reasonably estimate the potential impact of the data breach on its day-to-day operations.
- February 23, 2009
The Pennsylvania Credit Union Association and the Tuscaloosa, Ala. VA Federal Credit Union warn of a new payment processor data security breach.
- February 13, 2009
Trio arrested in Florida after allegedly using stolen credit card numbers for purchases at local Wal-Marts, officials said.
- February 11, 2009
Data protection, information leakage and identity and access management were a top priority for financial industry CISOs, according to a new survey.