Links in “Technology”
- U.S. Naming Names of Chinese Cyber Spies
The Department of Justice names several high-ranking Chinese officials as behind several cyber espionage attacks, a "watershed" moment to put faces to what has been a faceless crime. [5/23]
- Bitcoin: Transactions Less Anonymous Than Many Think
Those who are attracted to Bitcoin assuming their transactions aren't trackable by the government may be in for a surprise. [5/23]
- Risk Watch 14: How to Prepare for the New Cybersecurity Exam
The FFIEC recently announced the addition of a cybersecurity risk assessment to regular IT examinations. Join Jesse Boyer to learn how your institution can prepare for these exams which are beginning later this year. [5/22]
- 10 Slices of the Complete IT Security Pie
Individually, these 10 techniques may sound like no big deal. But together, they make a well-rounded, layered approach to a strong security foundation. [5/22]
- OCC Talks Cyber Security
Comptroller of the Currency, Thomas J. Curry, highlights what regulators are doing to meet the challenge of cyberattacks as well as the need for banks to implement robust programs to mitigate cybersecurity risk. [5/19]
- More Regulatory Cold Water Thrown on Bitcoin
Maryland joins in the regulatory chorus warning consumers about the high risks of virtual currency. [5/19]
- CFPB’s Electronic Version of Reg. Z: Trust, But Verify
CFPB's new "easier-to-navigate" electronic version of Reg. Z includes a disclaimer worth noting. [5/16]
- Stolen Card Data = Bank Switch + Retailer Switch
Survey finds that 60% of respondents would switch banks or stop going to a retailer if their card credentials were stolen in a breach. Card fraud concern is 7% higher than last year. [5/14]
- NCUA Exams in 2014 to Focus on Cybersecurity
NCUA has announced that examiners will be assessing credit unionâs ability to mitigate cybersecurity threats and to effectively respond to attacks. The Agency states that as credit unions have increased their use of online and mobile banking they have increased their risk for begin targets of cybercrimes. [5/13]
- Two-Step Authentication: Banks Can Steal a Page from Facebook’s Playbook
With EMV adoption far from a reality, two-step authentication, being employed now by Gmail, Twitter and Facebook, is one of three steps described here that banks can take now to better secure their transactions. [5/13]