Latest Cybersecurity Articles

Where to Spend in a Time of Crisis

Where to Spend in a Time of Crisis

Technology providers that cater to buy-side firms are knocking on doors in an industry that has seen widespread losses and sharp reductions in assets under…

Mobile Insecurity: Reality or Just hype?

Mobile Insecurity: Reality or Just hype?

The increasing functionality and numbers of mobile banking platforms, the growing sophistication of criminals, and the popularity of smart cell phones create the potential for…

Software as a Service as a Security Battleground

Software as a Service as a Security Battleground

Salesforce.com reached a milestone last fall: 1 million people using the online software company to host their customer relationship management systems and other key business…

Server Virtualization: Powerful Tool, Extra Exposure

Server Virtualization: Powerful Tool, Extra Exposure

Dividing a server into multiple virtual machines has brought down firms’ purchasing costs and allowed for more efficient use of existing hardware. However, virtualization also…

The Web 2.0 Threat

The Web 2.0 Threat

Leading-edge collaborative tools and interactive sites pose monitoring burden As the Web 2.0 movement makes interactive applications and social networks such as Facebook ubiquitous on…

Back-End Authentication Moves to Forefront

Back-End Authentication Moves to Forefront

User authentication has been getting a lot of attention lately, what with lingering threats of identity theft, a U.S. regulatory initiative to have banks and…

India Tightens Security

Article originally published in Insurance Networking News. Late spring 2005, the world learned that a crime ring that included call center employees of an Indian…

Biometrics Comes To the Heartland

A couple years ago, good security meant a good firewall at the periphery of a bank’s network. Today, given the range of internal and external…

Network Security: An Arkansas Bank Protects Communications Inside-out

A couple of years ago, good security meant a good firewall at the periphery of your network. Today, given the wide range of threats that…

Visa issues 10 ‘commandments’ for online merchants

In an attempt to reduce online credit-card fraud, Visa U.S.A. in San Francisco announced 10 “commandments” for online merchants to guard its cardholders’ information. And,…

Fake bank Web sites trick consumers into giving up personal data

A hacker doesn’t have to break into a bank’s computer to steal account numbers and access codes. It may be enough to set up a…