In the face of fraud, enterprise authentication is the key to helping to prevent information security breaches. But how do you deploy solutions that are at once versatile, compliant and cost-effective?
Steve Neville, Director of Identity Products and Solutions at Entrust, discusses:
The top enterprise...
So, did anyone read about the President's Cybersecurity Action Plan? I'm assuming you've read through all 10 points. You didn't stop to ponder after the first few did you? I mean, you didn't happen to stop after number 8? The one about the incident response plan?
Identity and Access Management (IAM) - it's a challenge for banking institutions of all sizes. And with institutions continually merging, acquiring and establishing new partnerships, the IAM challenge is only growing.
In an exclusive interview, Jay Arya, 1st VP of Information Security at Investors Savings Bank,...
Hard times have taken a toll everywhere - even when it comes to internal audit practices at financial institutions.
Yet, in the wake of security breaches and questionable business practices at some financial institutions, federal regulators are cracking down on auditors. In an exclusive interview, Holly Kidder, a...
Doug Brown Discusses Mobile Strategy, New Products, Biometric Security
Bank of America was one of the first institutions to move toward mobile banking in a big way. Two years into the initiative, Doug Brown, SVPO of Mobile Product Development, discusses:
Mobile trends at BoA;
Security hurdles the institution...
Driving home every day along the New Jersey highways, I often see the signs offering "Save Your Home from Foreclosure" with a toll free number to call for more information.
It is the sign of the times. Foreclosure rescue scams are on the rise, along with mortgage fraud.
For thousands of years, people have attempted to hide sensitive information from competitors or enemies.
Since January, critics of the Heartland Payment Systems data breach have called out for tougher encryption standards for financial institutions and their third-party service providers. Applications for...
In these times of mergers and acquisitions in the banking industry, identity and access management (IAM) is a huge challenge.
Mike Del Giudice of Crowe Horwath LLP shares insights on:
IAM trends in financial services;
How banking institutions are tackling IAM challenges;
The 'gotchas' to avoid.
From the president on down, the nation has a renewed focus on cybersecurity.
Nadia Short of General Dynamics, a major government/defense contractor, discusses:
The types of cybersecurity positions GD is filling;
Requirements for qualified personnel;
Potential career paths in cybersecurity.
Nadia D. Short...
So, General Motors files for bankruptcy today. Whoever thought such an event would unfold in our lifetimes - that the U.S. leader in one of the top industries of the 20th century would sputter into the 21st and end up broken down beside the road, like a car whose owner neglected to heed the "Check engine" light?
The National Cryptologic Museum (NCM) is the National Security Agency's principal gateway to the public, opening its doors in December 1993. Located adjacent to NSA Headquarters in Ft. George G. Meade, MD., the museum houses thousands of artifacts that collectively serve to sustain the history of the cryptologic...
"Cryptology is as old as mankind itself and dates from antiquity," says Patrick Weaden, curator at the National Cryptology Museum. People very early on realized that they needed to share certain information with certain people, so they developed devices to protect that information. Cryptology is the art and science of...
It's "tweet" time! Information Security Media Group (ISMG) has just registered with Twitter.com to start providing regular updates to audience members who also are enjoying the tweet life.
OK, so I know some of you out there are still kinda dying to know, but don't dare to ask - what is Twitter?