-
With the Colonial Pipeline attack still in the news, bank CEOs testifying at a recent hearing cited cyber risk as the biggest threat facing the industry. But members of Congress did not share those concerns, and instead were more focused on criticizing banks about overdraft fees and their level of investment in minority communities.
June 11 -
The Tennessee company said an unauthorized party gained access to dozens of accounts and obtained less than $1 million from some of those accounts.
April 28 -
The Michigan bank is the latest company to have customer data compromised through a software vulnerability. The incident reinforces the importance of attack simulations, constant searches for intrusions and exchanges of intel with peers.
March 15 -
Federal banking agencies want to give the industry a hard deadline for notifying their regulators about serious security breaches and failed system upgrades.
December 15 -
It has been 15 years since the federal banking agencies issued guidance on an institution’s obligation to inform its regulator about a cyberattack. A proposal to be unveiled this week could establish a more specific notification deadline.
December 14 -
It's important that breach mitigation strategies take younger people, gaming and school into account, says ForgeRock's Ben Goodman.
December 11ForgeRock -
Good communication is integral to facilitating collaboration between departments and offering a reminder that security is not achieved solely within the IT department; rather, it is a team effort, says KnowBe4's Javvad Malik.
November 2KnowB4 -
The regulator found that the financial services company failed to take precautions in disposing of hardware that contained sensitive customer information.
October 8 -
It’s about time that we stopped ranking personal data theft on perceived severity. Any breach in which personal data is stolen needs to be treated as highly serious and punishable, says Juniper Networks’ Laurence Pitt.
September 29Juniper Networks -
This information can be used to access bank accounts and combined with other information on the dark web to access social media profiles, email accounts and more, says Jumio's Robert Prigge.
September 14Jumio