Computing security includes identity management to ensure proper access controls to controlled or sensitive information and permission rights for individuals to view information and data maintained by others. Security is maintained by administrators with encryption and password control and through the use of tokens or biometric devices to ensure user identity.


Information Management NewsGartner analyst says that most enterprises are ‘inexperienced’ in mobile application security
Information Management NewsTo obtain approval and funding for security improvements, bank technologists have to make their case by pointing to losses from recent security breaches. But calculating those losses can be tricky.
Information Management NewsAs cyberattacks against banks escalate — with 93 percent of banks worldwide reporting they've been hit — Bremer Bank in Minnesota ramps up its defenses.
Information Management NewsHome Depot is working with banks and law enforcement agencies to investigate a potential theft of its customers' credit and debit card information.
Information Management NewsAlthough bankers are (hopefully) less likely to store compromising selfies in the cloud, the infiltration of celebrities' iCloud accounts illustrates the danger of saving anything with a consumer-oriented cloud service.
Information Management NewsBoards at community banks are being asked to have greater oversight of cybersecurity issues as data breaches continue to mount. The challenge is balancing such work with other demands.
Comments (1)
Information Management NewsGartner forecasts increased growth in security spending, including capabilities delivered by a range of software and services
Comments (2)
Information Management NewsJPMorgan customers were targeted with a phishing scam earlier this week aimed at obtaining online banking credentials.
Information Management NewsResearch firm ABI estimates data loss prevention market to reach $1.7 billion by year end
Comments (2)
CommentaryDeloitte research finds that financial services is the industry most targeted by cyber criminals.
Comments (1)
Information Management NewsA gang of hackers in Russia has amassed 1.2 billion sets of looted user names and passwords, according to a U.S. security company that said it's the largest known cache of stolen personal information.
Comments (1)
Information Management NewsThey haven't caught much media attention lately, but distributed denial of service attacks continue to take place and have become larger, researchers analyzing the latest attack patterns say.
Comments (1)
Twitter
Facebook
LinkedIn
Please note you must now log in with your email address and password.