Agencies need to pay more attention to supply chain security
Government agencies seeking the lowest bidders typically overlook cybersecurity when awarding contracts, and data breaches are the result, says a security rating expert.According to a…
Who’s winning the mobile payments war?
Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…
Who’s winning the mobile payments war?
Mobile payments – using your phone instead of a credit card to make purchases at retail locations – has not taken off. Yet.To read this…
Macros big again with cybercriminals
Up to a year ago, most phishing emails were all about tricking users into clicking on malicious links that led to malware downloads. Starting last…
Cyber-extortionists are liars
The good news about cyber criminals who go in for extortion is that they also tend to be liars. The bad news — they’re extremely…
Banks get attacked four times more than other industries
Modern-day criminals are still following Willie Sutton’s example of going after banks “because there’s where the money is.”According to a new report from Websense Security…
Mobile security: the coming battle of hardware versus software
I’m starting to see signs for Apple Pay and Google Wallet everywhere I go. Google just announced its Android Pay platform and deals with AT&T,…
Escalating Defenses
New Jersey’s Provident Bank expands staff training and email encryption to enhance information security After the epidemic of high-profile nonbank data breaches last year, New…
Card Crush: Credit card criminals try to exploit a rushed Apple Pay rollout
Apple Inc.’s rollout of its Apple Pay mobile payments app has been fraught with expensive card payment fraud, according to news reports. The much-vaunted iPhone…
Malware For Lease
A new botnet is helping cybercriminals phish for community bank customers Computer hackers typically cast their phishing nets expecting to hook megabank customers. After all,…
Lessons from the Sony Breach
By now you know that hackers calling themselves “Guardians of Peace” went through Sony Pictures Entertainment like a hot knife through butter. They collected everything–high-quality…
Positioned for Transition
A readiness checklist for meeting the upcoming Windows Server 2003 replacement deadline Microsoft Corp. will end technical security support for its popular Windows Server 2003…
Bolted Down Tight
Five steps for sustaining rigorous network security against constant cyberattacks Hackers are using sophisticated, automated tools to cast a wider net than ever before. Even…
New Cyberattacks Aim for ATM Management Systems
It’s called ATM cash-out fraud, and it’s a new data security threat where physical attacks and cyberattacks converge. Earlier this year, federal regulators warned financial…
5 non-traditional hiring tips for InfoSec
There’s a dramatic shortage of qualified information security professionals in the industry today. Globally, we’re a million people short, according to Cisco’s 2014 Annual Security…
4 reasons why virtual reality isn’t real yet
UK-based virtual worlds research firm KZero projects that 83 million head-mounted virtual reality display headsets will have been sold by 2018, with a consumer market…
Virtual reality gains a small foothold in the enterprise
The rapid growth of the mobile sector has had an unexpected dividend — by bringing down the costs and improving the quality of motion sensors,…
Microsoft, Cisco, Avaya hone their virtual reality strategies
The leading unified communications (UC) vendors are taking a hard look at the opportunities for virtual reality in the conference room or the boardroom. For…
The Real Risks of Virtual Reality
This summer, Facebook finalized its $2 billion purchase of Oculus VR, a virtual reality headset maker. The purchase promises to usher in a new era…
How Will Iraq Sanctions Affect Treasury and Finance?
The United States government and the United Nations Security Council recently introduced sanctions designed to discourage companies from doing business in Iraq. But experts are…
Amid Ukraine Escalation, More Woes for Treasury and Finance
Escalating tensions in the Ukraine and fears that Russia might cut off gas supplies to Europe are creating an ever more difficult environment for multinationals…
Back to Basics: IT security routines that won’t break the budget
Just because your community bank isn’t one of the giants of the financial industry doesn’t mean it’s off the target list of today’s proliferating cybercriminals.…
Multifactor Momentum
Multifactor authentication, the process of using more than one method or system to confirm the identities of consumers online, has been around for years. But…
Ukraine Turmoil Wreaks Havoc on Treasury and Finance Groups
Treasury and finance executives whose companies do business in Russia, the Ukraine, and other former Soviet republics are already seeing the effects of the mounting…
Tools catch security holes in open source code
This year has been the best of times and the worst of times for open source code and security. On the one hand, the latest…
Sphere of Influence
Treasury and finance executives whose companies do business in Russia, the Ukraine, and other former Soviet republics are already seeing the effects of the Crimean…
10 tips to attract women to infosec jobs
Women make up just 11 percent of information security professionals. Just increasing that number to 22 percent would solve the industry’s staffing shortage problem. Unfortunately,…
How to get creative with your penetration testing
While there are plenty of standardized methods for penetration testing that we’re all familiar with, the bad guys aren’t sticking to traditional methods for…
Open source pitfalls — and how to avoid them
It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers,…