IT GRC Forum

FacebookJoin our Linkedin Group!Follow us on Twitter!Subscribe to our Feeds!
E-mail

GAO: EPA Needs to Resolve Information Security Weaknesses

August 20, 2012 - The GAO has found that although the Environmental Protection Agency (EPA) has taken steps to safeguard the information and systems that support its mission, security control weaknesses pervaded its systems and networks, thereby jeopardizing the agency's ability to sufficiently protect the confidentiality, integrity, and availability of its information and systems.

Read more...
 
E-mail

CBA reaps the benefits of $1.1 billion technology upgrade programme

August 15, 2012 - Commonwealth Bank of Australia says it is beginning to reap the rewards of its $1.1 billion core banking modernisation programme, with a measurable increase in productivity contributing towards a $7.1 billion profit for the year ending 30 June.

Read more...
 
E-mail

Former Lloyds online security head pleads guilty to £2.46m fraud

August 8, 2012 - Lloyds' former head of fraud and security for digital banking has pleaded guilty in connection with a £2.46 million fraud.

Read more...
 
E-mail

US small businesses ditch banks over online fraud

August 6, 2012 - Around three quarters of small and medium-sized businesses (SMBs) in the US have fallen victim to online banking fraud and many are ditching their provider as a result, according to research from Guardian Analytics and Ponemon Institute.

Read more...
 
E-mail

Illegal Web Trade in Personal Information Soars

July 17, 2012 - Experian CreditExpert's identity web monitoring service reveals more than 12 million pieces of personal information traded online globally between January and April 2012.

Read more...
 
E-mail

GAO: IT Challenges in Securing the Electricity Grid

July 17, 2012 - The threats to systems supporting critical infrastructures are evolving and growing. In testimony, the Director of National Intelligence noted a dramatic increase in cyber activity targeting U.S. computers and systems, including a more than tripling of the volume of malicious software.

Read more...
 
Page 18 of 23

Subscribe via Email

 Your Email:
Banner
Banner
Banner
Banner