Because work and life are now more fluid than ever, government employees are working at literally any hour of the day or night - and anywhere a smart device can pick up a signal. True employee security, collaboration, and compliance require a broader suite of mobile solutions. Learn how smart agencies are protecting...
As the financial industry anxiously awaits the release of new online authentication guidance from the FFIEC, experts speculate about what steps banks and credit unions should be taking now to prepare.
As banking institutions seek tremendous cost savings from cloud infrastructure and services, two key factors must be considered: The Patriot Act, which has strict stipulations regarding access to data and where it is stored, and the protection of data -- even from third party service providers.
This webinar...
ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?
USB flash drives and other portable devices are valuable tools in the typical government staffer's virtual toolkit. These handy devices allow workers to efficiently accomplish their duties and carry out their tasks for the public good. But left unchecked, the use of portable devices can also potentially infect public...
The US government is under constant attack from adversaries looking to breach and gain access to their systems. To ultimately ensure they have the best possible endpoint protection, the US military engages in staged cyber security challenges.
During a recent exercise, this US military command center discovered...
The Federal Information Security Management Act of 2002 (FISMA) was passed with the purpose of improving computer and network security at government agencies and government contractors. The Act called for increased security standards and yearly audits of the systems and processes, and tasked the National Institute of...
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...
The Internet has become a strategic customer acquisition and services distribution channel for financial services companies. Consumers are able to apply and obtain credit online, transfer funds, trade commodities and pay bills by simply clicking a few buttons from anywhere at any time. Unfortunately, in the online...
Today, financial services IT organizations need to secure more than just the people, systems and infrastructure that sit inside their buildings. IT organizations must secure a variety of mobile user groups like executives, brokers, agents, consultants, and contractors. Additionally, with the growth of online account...
Key Information Security related regulations
Common Threads of all the regulations
Requirements and Best Practices to be compliant
What institutions are doing right in Information Security compliance
What still needs to be implemented at financial institutions
Future Information Security related legislation
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.