Jobs in information security -- including architects, analysts and administrators with hot skills and competencies -- are among the IT opportunities offering the most employment security in the current economy.
This is the news from Foote Partners, LLC, a Florida-based research consultancy that focuses on IT...
The Gramm-Leach-Bliley Act (GLBA), also known as The Financial Modernization Act of 1999, was enacted to ensure protection over customer's records and information. Authorization to implement this act was given to The Federal Trade Commission (FTC) with an effective date for compliance set on May 23, 2003.
GLBA...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Log Management is a necessary first step, but only a baseline technology. Compliance mandates and good security practice also require real-time, end-to-end monitoring to identify, prioritize, analyze and remediate the true threats. Given the increase in targeted stealth attacks, clear visibility is more important than...
Hi. This is Tom Field, Editorial Director with Information Security Media Group. Welcome to today's session entitled Log Management: How to Better Safeguard Customer Data. Your presenters and sponsors today are Chris Peterson, Founder and CTO of LogRhythm, and John Earl, CTO and Vice President of PowerTech. ...
In the current economic and cultural environment, the financial services industry is being particularly scrutinized with regards to legal and regulatory compliance.
Learn more about the legal and regulatory compliance requirements targeting the Finance industry.
Download this white paper to:
Learn about...
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
What if you could immediately tap into the unused value that exists within your IT infrastructure?
This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization.
It includes an "Action Worksheet"...
This report includes the input of over 2,000 companies running AIX and IBM i (i5/OS) environments regarding their data protection, recovery and optimization technologies and strategies.
Learn how your peers are striking the balance between the often antagonistic priorities of optimum IT availability and...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
With hundreds and thousands of automated systems producing log data, an organization's ability to respond to "abnormal" activities in a timely manner is dependent on the quality of its log management program and related processes.
Attend this webinar to hear industry experts discuss real-life scenarios and offer...
Information Security Media Group recently attended the Gartner IT Security Summit 2008 in Washington, D.C. where the theme of the conference was information security 5-10 years from now. We interviewed vendors on the floor of the expo hall and heard about solutions focusing on topics ranging from application security...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
One financial services organization faced multiple data security and compliance challenges, including the need to address compliance in a more cost effective way. This organization turned to database activity monitoring to protect their most valuable assets - their data. They had completed a fairly substantial SOX...
In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.eu, you agree to our use of cookies.