ATM skimming is a huge fraud concern for banks and credit unions. But M&T Bank says it has developed an effective anti-skimming solution - and it wants to share this product with other institutions.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
"With a company-issued device, you can issue a policy that says users have no rights of privacy over information on the device," says Javelin's Tom Wills. But with employee-owned devices? A whole new set of issues.
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
Bertucci's has become a beloved destination for Italian food since its
formation in 1981. With more than 2,000 employees in over 90 locations,
managing unauthorized software downloads on their growing computer
systems has become a daunting task. Unsupported and unauthorized software
and downloads by employees...
As international ACH transactions increase, banking institutions can't just think about passing a security compliance audit. Effective and efficient monitoring will be keys to mitigating fraud risks.
New mobile technology is behind a growing public concern about Internet security, says former Transportation Security Administration CISO Patricia Titus, who now holds the same post at Unisys.
Union Bank, a hallowed and service-oriented financial institution, relies on Good Technology to protect bank data on the mobile devices its employees prefer - while delivering the security and management the company requires.
Read this white paper to find out how Union Bank conquered the challenge and derived at...
As details about the Epsilon e-mail breach unfold, the list of affected companies grows, including major banks and merchants. Here is the latest list of the companies known to have been impacted by the incident.
Communicating with customers about the incident and warning them not to click links in phishing e-mails are all these impacted institutions and companies really can do, says Jeremiah Grossman, chief technology officer of WhiteHat Security.
"It is the biggest breach we have ever seen; and to say no financial information has been stolen is, well, understating the massive breach and concern," says Neil Schwartzman, founder and chief security specialist at CASL Consulting.
The DoD has banned the use of USB devices after an unauthorized device containing "agent.btz", a variation of the Storm Worm, was connected to a sensitive DoD network causing massive outages. To ensure security without impeding government business, a new policy is forthcoming that will require the management and...
As USB devices have evolved into useful storage media, they've also turned into a security nightmare for agencies.
The usage of USB devices should be encouraged and embraced to improve productivity, but they also must be managed to minimize the risks inherent with these tools.
This paper discusses how USB...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing devicesecurity.io, you agree to our use of cookies.