The Latest News

  • Pay-at-the-Pump Skimming: New Solution

    New Database Will Predict Skimming Trends Pay-at-the-Pump Skimming: New Solution

    Curbing pay-at-the-pump card skimming attacks is daunting, and incident tracking is to blame. But a new initiative spearheaded by the oil industry and card issuers raises the bar for information sharing. Read more...

  • ID Theft Scam Run from Prison

    Six-Year Scheme Targeted Elderly Accountholders ID Theft Scam Run from Prison

    Customers of Bank of America, Citibank and the former Washington Mutual Bank were taken for millions as part of an ID theft and bank fraud scheme run for nearly six years from a California prison. Read more...

  • Hacktivist Hints at New DDoS Attacks

    New Interview: 'We Have Done What We Had Promised' Hacktivist Hints at New DDoS Attacks

    For the third time in a month, a source claiming to be part of the Izz ad-Din al-Qassam Cyber Fighters has granted an interview to discuss the distributed denial of service attacks on U.S. banks. Read more...

  • PATCO Owner on Fraud Settlement

    Fraud Victim Mark Patterson: 'I Wouldn't Do ACH' PATCO Owner on Fraud Settlement

    The PATCO fraud dispute could have been settled in 2009, says co-owner Mark Patterson. Why did the case drag on, and what can banking institutions and fraud victims learn from PATCO's recent settlement? Read more...

  • Banking Exec Sentenced for Fraud Scheme

    Theft Proves Anti-Fraud, Ethics Training Are Necessities Banking Exec Sentenced for Fraud Scheme

    An insider fraud scheme at a financial institution highlights how executives with too much power can abuse the system. What steps could have been taken to prevent the losses that ultimately led to this institution's failure? Read more...

  • Article

    South Carolina IG: Centralize Infosec

    Most Agency CIOs Back Proposal to Centralize State IT Security By Eric Chabrow
    South Carolina IG: Centralize Infosec

    Inspector General Patrick Malley deems as inadequate the existing approach to state IT security governance that resulted in a breach last summer of a Department of Revenue tax system, which exposed the Social Security numbers of nearly 4 million taxpayers.

  • Article

    Addressing 2013's Top 4 Cyber Risks

    Strategies to Fight Mobile Malware, Emerging Threats By Jeffrey Roman
    Addressing 2013's Top 4 Cyber Risks

    Mobile malware and cloud-based botnets will be top cyberthreats for 2013, says Georgia Tech's Paul Royal. How should organizations address these and other upcoming threats in the New Year?

  • Blog

    Know Thy Attackers

    Why Information Sharing is Key to Security By Tracy Kitten
    Know Thy Attackers

    Information sharing is key. The more we share about attacks - vulnerabilities and vectors - the more we will learn about how the attacks are waged, who's behind them and what they're after.

  • Article

    Post-Sandy: Lessons Learned

    How Careful Planning Helped Ensure Business Continuity By Tracy Kitten
    Post-Sandy: Lessons Learned

    Organizations will be learning lessons from Superstorm Sandy for years to come. But one community bank's story speaks to the power of business continuity preparation, which helped avert catastrophe.

  • Article

    Confronting Smart Grid's Cyber Challenge

    Planning, Coordination Needed from the Start By Jeffrey Roman
    Confronting Smart Grid's Cyber Challenge

    The complexity of the smart grid introduces a cybersecurity challenge that isn't easy to overcome. ENISA's Konstantinos Moulinos outlines the steps needed to improve smart grid security.

More news...

Webinars

  • Risk Management Framework: Learn from NIST

    Cyber threats can destroy any organization or its reputation, and recent incidents prove they can come from anywhere - malware in a security vendor's e-mail attachment, a lost laptop with critical...

  • Risk Management: New Strategies for Employee Screening

    All employers¸ as part of their risk management strategy, have an obligation to exercise a reasonable duty of care in hiring. In addition, many organizations have a legal duty to not employ...

More webinars...

White Papers

More whitepapers...
ARTICLE GAO: Step Up Mobile-Device Security

The Government Accountability Office justifies the need for further action, noting that malware...

Latest Tweets and Mentions

ARTICLE GAO: Step Up Mobile-Device Security

The Government Accountability Office justifies the need for further action, noting that malware...

The ISMG Network