BankInfoSecurity.com
Live Webinar | The Automation Journey in Endpoint Management: From Decision Support to Actionable Intelligence
6 days 15 hours ago
Live Webinar | The Challenges of Multi-Cloud Environments
6 days 15 hours ago
Webinar | Why the Best Cyber Resilience Plan Assumes Failure
6 days 15 hours ago
Webinar | Closing the "Clouds Gaps" Around the Shared Responsibility Model: Ensuring Your Data Can Weather Any Incident
6 days 15 hours ago
Why CISOs Need to Own AI Enterprise Risk
6 days 15 hours ago
Vigilance Cyber Security's Moriah Hara on AI Automation and Responsible AI
Mohira Hara, CISO and AI security, risk and governance consultant at Vigilance Cyber Security, says AI is reshaping financial services by accelerating anti-money laundering efforts, automating SOC functions and driving stronger governance frameworks that make CISOs central to managing AI risk.
Mohira Hara, CISO and AI security, risk and governance consultant at Vigilance Cyber Security, says AI is reshaping financial services by accelerating anti-money laundering efforts, automating SOC functions and driving stronger governance frameworks that make CISOs central to managing AI risk.
HSCC Guidance to Help Health Sector Navigate AI Cyber Risks
6 days 15 hours ago
Documents Will Spotlight 5 Critical Risk Areas, Best Practices for Healthcare AI
The healthcare sector faces an array of complex cyber risk considerations involving artificial intelligence. The Health Sector Coordinating Council is rolling out a series of guidance documents to help these organizations navigate a long list of AI cybersecurity challenges.
The healthcare sector faces an array of complex cyber risk considerations involving artificial intelligence. The Health Sector Coordinating Council is rolling out a series of guidance documents to help these organizations navigate a long list of AI cybersecurity challenges.
Federal Shutdown Deal Revives Key CISA Grant, Some Staffing
6 days 15 hours ago
CISA Pre-Shutdown Staffing Levels, State Grant Program to Be Restored Under Plan
A congressional funding bill would reverse shutdown-era layoffs at the Cybersecurity and Infrastructure Security Agency and restore the $1B State and Local Cybersecurity Grant Program, temporarily stabilizing the agency’s operations and buying Congress time for long-term reforms.
A congressional funding bill would reverse shutdown-era layoffs at the Cybersecurity and Infrastructure Security Agency and restore the $1B State and Local Cybersecurity Grant Program, temporarily stabilizing the agency’s operations and buying Congress time for long-term reforms.
UK Unveils Cyber Security and Resilience Bill
6 days 15 hours ago
Legislation Proposes More Regulations for Greater Swath of the UK Economy
The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue.
The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue.
Printer Driver Updater Flaws Could Usher in Poisoned Updates
1 week ago
Fiery Driver Version Didn't Validate Source File, Had Hardcoded Credentials
Printer servers from major manufactures such as Canon and Sharp could be susceptible to a supply chain hack due to flaws in a driver updater, researchers warn. Cyderes said Wednesday it identified two major security risks in a version of the Fiery Driver Updater.
Printer servers from major manufactures such as Canon and Sharp could be susceptible to a supply chain hack due to flaws in a driver updater, researchers warn. Cyderes said Wednesday it identified two major security risks in a version of the Fiery Driver Updater.
OnDemand | Analyst Insights: Building Cyber Resilience Through Proactive Recovery Strategies
1 week ago
Nacha Revises Fraud Monitoring Rules for FIs
1 week ago
Nacha's Devon Marsh on Banks Proving They 'Reasonably Intended' to Identify Fraud
Nacha's 2026 rule amendments pivot from "commercially reasonable" to "reasonably intended" fraud detection standards. Nacha's Devon Marsh explains what this shift means for RDFIs and ODFIs and how banks and financial institutions can define and demonstrate reasonable practices.
Nacha's 2026 rule amendments pivot from "commercially reasonable" to "reasonably intended" fraud detection standards. Nacha's Devon Marsh explains what this shift means for RDFIs and ODFIs and how banks and financial institutions can define and demonstrate reasonable practices.
How Prompt Injection Is Breaking Digital Forensics Norms
1 week ago
Why Traditional Logs Can't Explain What Happens Inside a Rogue AI Model
Logs are where cybersecurity teams spot how and when the break in occurred. For a new type of attack, logs will be worthless - a condition that will especially challenge digital responders as artificial intelligence systems become more ubiquitous.
Logs are where cybersecurity teams spot how and when the break in occurred. For a new type of attack, logs will be worthless - a condition that will especially challenge digital responders as artificial intelligence systems become more ubiquitous.
US Congress Moves to Revive CISA 2015 After Shutdown
1 week ago
Lawmakers Include Extension of Cyberthreat Sharing Law in Shutdown Resolution
A statute underpinning corporate cybersecurity information sharing may come back into effect along with funding to reopen the U.S. federal government after six weeks of being shutdown. The Cybersecurity Information Sharing Act of 2015 expired the same day Washington shut down on Oct. 1.
A statute underpinning corporate cybersecurity information sharing may come back into effect along with funding to reopen the U.S. federal government after six weeks of being shutdown. The Cybersecurity Information Sharing Act of 2015 expired the same day Washington shut down on Oct. 1.
Synnovis Notifying UK Providers of Data Theft in 2024 Attack
1 week ago
Ransomware Attack on British Pathology Lab Disrupted Patient Care for Months
British pathology laboratory services firm Synnovis has completed a forensics review of data stolen in a June 2024 ransomware attack and is notifying affected healthcare organizations. Those providers will be responsible for notifying their own affected patients, if deemed necessary, the firm said.
British pathology laboratory services firm Synnovis has completed a forensics review of data stolen in a June 2024 ransomware attack and is notifying affected healthcare organizations. Those providers will be responsible for notifying their own affected patients, if deemed necessary, the firm said.
Who Owns the Cybersecurity of Space?
1 week 1 day ago
Orbital Frontier Is the Next Ungoverned Internet, and We Have Left It Open to Attack
The orbital frontier is the next ungoverned internet - a vast, vulnerable network of over 11,000 satellites without a cybersecurity framework. As nations race to commercialize space, we've left the orbit open to attack. Who will govern space cybersecurity?
The orbital frontier is the next ungoverned internet - a vast, vulnerable network of over 11,000 satellites without a cybersecurity framework. As nations race to commercialize space, we've left the orbit open to attack. Who will govern space cybersecurity?
Charting the Course to SASE: Convergence, Unification, and the Future of Secure Connectivity
1 week 1 day ago
Passwordless Future: Smart Verification for Fraud Prevention
1 week 1 day ago
Steve Lenderman of isolved on Cross-Device Challenges, User Adoption Strategies
Steve Lenderman, head of fraud prevention at isolved, discusses the shift to passwordless authentication, addressing adoption challenges across multiple devices, the link between cybersecurity and fraud prevention, and how behavioral analytics will shape identity verification in 2026 and beyond.
Steve Lenderman, head of fraud prevention at isolved, discusses the shift to passwordless authentication, addressing adoption challenges across multiple devices, the link between cybersecurity and fraud prevention, and how behavioral analytics will shape identity verification in 2026 and beyond.
States Fine Firm $5.1M in Hack Affecting 3 Million Students
1 week 1 day ago
AGs Cite Security Failures Leading to Illuminate Education's Late 2021 Data Theft
A California-based vendor of software used to collect and analyze student data, including records of children with disabilities and special educational needs, has been fined a total of $5.1 million by the attorneys general in three states in the wake of a 2021 hack that affected 3 million people.
A California-based vendor of software used to collect and analyze student data, including records of children with disabilities and special educational needs, has been fined a total of $5.1 million by the attorneys general in three states in the wake of a 2021 hack that affected 3 million people.
Wi-Fi Beamforming Tech Can Identify Individuals by Gait
1 week 1 day ago
Pedestrians Uniquely Refract Directional Radio Signals
The way you use your walk - specifically when striding through a Wi-Fi field shaped by directional antennae - can reveal who you are, found researchers who investigated the surveillance potential of wireless routers. "Every router is a potential surveillance device," say researchers.
The way you use your walk - specifically when striding through a Wi-Fi field shaped by directional antennae - can reveal who you are, found researchers who investigated the surveillance potential of wireless routers. "Every router is a potential surveillance device," say researchers.
Checked
7 hours 7 minutes ago
BankInfoSecurity.com RSS News Feeds on bank information security news, regulations, blogs and education
BankInfoSecurity.com feed