- April 22, 2009
Finjan researchers discovered a botnet of 1.9 million compromised computers at banks, government agencies and other organizations.
- April 14, 2009
Upheaval in the financial-services industry has put the spotlight on financial information security. Experts share ways to keep sensitive information secure during an M&A.
- April 07, 2009
Industry consortium launches effort to see how biometrics could improve customer authentication and battle identity theft. Analyst says iris scanning at ATMs holds potential.
- April 02, 2009
Student loan guarantor deploys data masking technology to secure sensitive information used in development and testing.
- March 18, 2009
Company issued a security update after criminals attacked its Windows-based ATMs in Russia and installed malware.
Sponsored by IBM - There’s a new mantra in endpoint management: A device is a device is a device. If you’re in IT or security, you have to treat every device the same way, no matter the format or operating system version. The answer? A UEM with cognitive capabilities. See More
Sponsored by IBM - UEM provides the appropriate levels of productivity and security functionality to support your entire environment of smartphones, tablets, laptops, desktops, wearables and IoT. Here are the top 10 things to look for in a solution. See More
Sponsored by IBM - When used in combination, UEM and AI/cognitive technologies deliver an intelligent advantage that results in cost savings, reduced complexity and productivity gains. It’s time to stop using yesterday’s technologies to address tomorrow’s challenges. See More
Sponsored by IBM - Enterprises need a tool that provides centralized visibility, control, and security for all endpoints, users, applications, content, and data. With unified endpoint management, IT can finally modernize endpoint management and security. Here’s how. See More
- March 16, 2009
Evaluating service provider controls can take a lot of time and effort, but the Shared Assessments program aims to give financial institutions and other organizations a way to streamline...
- March 16, 2009
Breaches prompt Visa to remove payment processors from its list of PCI-compliant service providers.
- March 05, 2009
Survey finds victims of financial fraud more likely to change their shopping and payment behavior, including their choice of bank.
- March 03, 2009
Panda Security report examines increasingly sophisticated malware that aims to steal banking credentials.
- March 02, 2009
Visa statement counters reports that a second payment processor was compromised.
- February 27, 2009
Bank uses email encryption to securely exchange confidential information with commercial customers.
- February 24, 2009
Heartland CEO Robert Carr said the company still can't reasonably estimate the potential impact of the data breach on its day-to-day operations.
- February 23, 2009
The Pennsylvania Credit Union Association and the Tuscaloosa, Ala. VA Federal Credit Union warn of a new payment processor data security breach.
- February 13, 2009
Trio arrested in Florida after allegedly using stolen credit card numbers for purchases at local Wal-Marts, officials said.
- February 11, 2009
Data protection, information leakage and identity and access management were a top priority for financial industry CISOs, according to a new survey.