You and your IT staffers may be working hard to keep hackers at bay, but cyberintruders spend an average of 416 days inside an enterprise's computer systems before detection.
Who has the best secrets for protecting a hen house? Just ask a fox.
More companies are being victimized by inadvertent releases of information. Sometimes the results are simply embarrassing. Sometimes they are quite sensitive from a compliance standpoint. And sometimes they are almost dangerous.
Two-factor authentication has taken its lumps as a security tool as of late. So the future would appear to be now for alternative security methods. The movement toward this future, however, will take place slowly.
A brazen global cabal of thieves stole $45 million in hours from ATMs around the globe -- in a crime that sent shockwaves around the banking and security communities. One prosecutor in New York called it "a massive 21st century bank heist."
Well, we have a new wrinkle in the build vs. buy debate. If you build your own trading gear, you don't have to worry about your vendors spying on you.
A hacker collective called Group Anonymous recently announced plans for a major cyberattack targeting major banks and government agencies.
The globally coordinated attack on ATMs was breathtaking in its scope and sophistication. It merited front-page headlines around the world. But traditional methods of cybertheft are still alive and well.
As the GRC mandate spread throughout enterprises, many pondered the exact role of the CFO, the General Counsel, the Chief Risk Officer and the Chief Security Officer, not to mention the Chief Compliance Officer, all in relation to the board of directors and the CEO.
Compliance Week offers an interesting metaphor for GRC processes set up to grapple with AML concerns: "Who knew that the art of anti-money laundering (AML) compliance had so much in common with the science of spotting fake paintings?"