Around the world, rapidly evolving technology, end-user expectations and system complexity are forcing payments stakeholders to reassess their strategies. Recognizing these shifts, the Federal Reserve released Strategies for Improving the U.S. Payment System, an ambitious, multi-year plan that focuses on improving the...
Despite near-constant warnings from law enforcement officials and the information security community, too many organizations still aren't taking security seriously, experts warned at the Irish Cyber Crime Conference in Dublin.
When Benjamin Wyrick of VASCO Data Security looks toward 2016, he sees financial institutions embracing new mobile banking apps that are at once convenient and secure. What are the keys to making his vision a reality?
Mobile devices are expected to become the dominant banking and payment channel in the near future. This puts them directly in the cross-hairs of threat actors around the world as a prime vector to gain access to your information, network and money. In this session we'll see exactly how rogue apps, malware and...
The emergence of the EMV chip in the U.S. is soon going to change the payments game for issuers and merchants. Here, Sophos' Chet Wisniewski describes what bankers should be doing now to prepare.
As the U.S. embarks upon its migration to EMV, fraudsters will begin testing other vulnerabilities and channels to exploit. As EMV alone does not protect all transaction-related data from exposure during a breach, we need to take a look at a broad range of complementary technologies, such as tokenization, encryption...
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at software provider CA Technologies.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
The Target breach was the hot topic for many RSA 2014 attendees, but Gartner's Avivah Litan was already talking about the next Target - a UK retailer that may have suffered a similar hack, exposing payment card data.
On the heels of the FFIEC's new business continuity guidelines, Deputy Comptroller Beth Dugan hints that new guidance related to cybersecurity risks affecting payments and mobile transactions may be coming.
In the aftermath of a payment card breach, as fraudsters race to exploit the stolen information, card issuers and affected customers take steps to mitigate risks. Here's a look at the lifecycle of a payment card breach from three perspectives.
The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Financial transactions on smart phones require layered security that helps outsmart cyberthieves, says Alan Dabbiere, chairman of AirWatch, who describes today's mobile challenges.
As mobile threats have evolved, so has mobile security. What used to be the benchmark - mobile device management - today is merely the baseline. While organizations today develop mobile security maturity, they enhance not just device security, but also content, application and transaction security. Where does your...
A massive international operation has resulted in the arrest of 118 people suspected of using stolen card data to buy airline tickets, or using fake tickets, thanks to big data capabilities for combating crime.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.