The global insurance company, AXA, will no longer write policies in France that reimburse customers for extortion payments made to ransomware criminals. How much longer before the same applies in the U.S.?
Recently, the Board of Governors of the Federal Reserve System, CFPB, FDIC, NCUA and OCC released a request for information and comment on financial institutions’ use of artificial intelligence and machine learning.
I’m writing this column just days after the Microsoft Exchange vulnerability release, and I’m sure that by the time this is published, it will be much, much worse.
As cyber threats have increased, more organizations need access to the latest threat intelligence.
The first rounds of PPP helped more than five million small businesses in the United States in the amount of $525 billion in funding, but not without a dark side to the program.
Cyber threats are daunting. Not only are they complex and constantly evolving, but they also have the potential to impart significant financial and reputational damage to our financial institutions.
Changes in technology have been revolutionizing business for a long time but recently this trend has been expedited due to the rapid increase in work-from-home as well as the adoption of technologies such as the cloud.
Social media has changed the ways we live our lives — from the way we get our news to the way we interact with our family, friends and peers. It’s everywhere, it’s unavoidable, it’s powerful and it’s here to stay.
Here we are almost to 2021. Do you feel any more cybersecure? Just this year, we’ve seen a 20% increase in cyber fraud and abuse and a startling 200% increase in business email compromises.
Bankers have to remember that an ATM is really an electronic box with cash inside; who wouldn’t want to steal it? What steps can you take to protect your bank from this growing crime?
For the 17th year in a row, the National Cyber Security Alliance and CISA have announced October as Cybersecurity Awareness Month. This year’s theme is “Do Your Part. #BeCyberSmart.”
With a multilayered approach, no single layer’s failure results in a security breach. In a sense, each layer is designed to fail — or to allow for the inevitable — while still providing exceptional security.
Most organizations struggle with just being secure and functional, but the financial services industry has the bonus plan by including compliance.
What have we achieved with our investment, are we any more secure than we were, how much more are we going to spend?
When the mandate came down to get employees up and running first and foremost in order to service the customers, there wasn’t enough time to properly address each security risk.
I think we’ve learned that we can secure our remote workforces and, at the same time, they can continue to be productive. As for myself, I now have a much clearer picture of where my organization’s cyber weaknesses are.
Business email compromise is a sophisticated scam that targets both businesses and individuals that transact legitimate transfer of funds requests.
History is full of tech that ebbed and flowed until the right formula was found. Design and workflow are questions one should ask before launching any new tech.
As companies get better at detecting cyber events and data breaches, most continue to struggle with the proper handling of these incidents.
“The main thing is to keep the main thing the main thing,” written by famous business author, Stephen Covey, should especially ring true as we’ve entered into a new decade.
In a state with an estimated population of more than 28 million, it’s amazing what the Texas Legislature accomplishes in 140 days every other year.
A survey conducted by The Harris Poll found that an overwhelming majority of consumers (92%) have concerns about the security of their personal, confidential online data.
Vendor risk management has become a crucial area of cybersecurity as banks move operations to the cloud and asset managers hire third parties to manage their technology.
Banks and other financial institutions are faced with the critical challenge of ensuring the protection of their people, assets and information. Security officers should utilize an ongoing assessment program to monitor and respond to changing risks.