Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
Organizations using semantics and big data tools are creating a new position called data scientist to help uncover fraud and identify undetected vulnerabilities. Here are profiles of three leaders who have embraced this role.
As the growth in mobile devices creates new opportunities for consumers and businesses alike, new threats are emerging. iovation's mobile fraud detection white paper will help you understand the evolving mobile landscape, the business and technical decisions that you may soon have to make regarding fraud risk and how...
The Global Payments data breach has expanded, and now may include the exposure of personal data linked to merchant applicants. But what does this latest news mean? Industry experts offer insights.
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
Malware and Trojans are now spreading faster than ever, with Zeus deployed on millions of PCs and mobile devices capable of man-in-the-browser attacks. Learn to stop cybercriminals and their malware, before they can do damage, while letting your good customers breeze on through.
Aite Group, an independent...
When Joseph Bognanno of Wolters Kluwer Financial Services examines 2012's financial fraud trends, all he sees is more - more of everything, from schemes to new guidance. How can banks stay ahead?
When it comes to the FFIEC Authentication Guidance, Aite analyst Shirley Inscoe fears too many banking institutions are investing only in achieving compliance - not ongoing security.
According to our new survey, more than half of banking institutions expect an increase in fraud-fighting resources this year. But how are they investing those resources? The answers may surprise you.
Microsoft Corp. says it led a team that has successfully disrupted command and control servers used to run some of the world's most damaging variations of botnets proliferating the Zeus malware.
The FFIEC Authentication Guidance update has been in circulation since mid-2011. But as banking examiners begin testing for conformance, we find:
Only 11% of surveyed institutions have come into conformance since the guidance was issued;
Nearly 30% don't fully understand the guidance;
88% do not believe the...
Maintaining adequate data security is challenging for investment firms and banks, which must grapple with a widening array of security and regulatory issues. With attacks leading to losses in the hundreds of millions of dollars, many financial firms are seeking - and finding - help in the battle against online...
Malware has become the primary attack tool used by cybercriminals to execute account takeover and initiate fraudulent transactions, and has been able to stay undetected by most security controls implemented by financial institutions. By preventing anomalous transactions generated by malware-infected machines,...
"The misfortune here for the banks is that they can have the best fraud-detection systems out there ... but it all breaks down when they call the 'hacker' to verify the transaction," says Gartner's Avivah Litan.
Regulators have hinted at it, and industry experts say it's coming. U.S. banking institutions can expect to see new guidance for mobile banking. The open questions are: When, and in what form?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.