Posted on November 4th, 2009 No comments
Fourth Time Agency Has Pushed Back Enforcement DateFor the fourth time in a year, the Federal Trade Commission (FTC) has extended the enforcement deadline for state-chartered credit unions and non-banking entities covered by the Identity Theft Red Flags Rule.
FTC Extends Red Flags Deadline – Again – to June 1, 2010
Posted on November 3rd, 2009 1 comment
ITRC Solution 30 – Financial Account Takeover or Use of Existing Account
Read the original here:
ITRC Solution 30 – Financial Account Takeover
Posted on November 3rd, 2009 No comments
GoMo News- Wait, what – the Napster? Yes, they are still around. And they are making serious moves in mobile commerce and content.
Read the original post:
Napster, mobile music and the future of mobile commerce
Posted on September 28th, 2009 1 comment
Bank Technology News- “I would go as far as to say that multi-factor authentication as defined under FFIEC, isn’t sufficient to meet the environment we’re in,” says Tom Wills, analyst at Javelin Strategy & Research.more-> That’s not what banks want to hear. Those that can’t afford to upgrade security are wondering what kind of software
Is the Genie Out?
Posted on August 19th, 2009 No comments
Bank Info Security- “It’s always great to see the bad guys being hauled in, especially with a case this big, but it would be a mistake to assume that there aren’t other criminals out there with similar goals and skill sets,” says Tom Wills, Senior Analyst, Security & Fraud at Javelin Strategy and Research. Because
Follow this link:
Experts: More Heartland-Style Breaches Expected
Posted on July 31st, 2009 No comments
Bank Technology News-“In America we have a bias at the top levels of management; there’s a notion that standardization is non-competitive,” says Tom Wills, senior analyst in charge of security and fraud practice for Javelin Strategy and Research, who says the tech-heavy focus of most federated ID efforts hasn’t helped. “These initiatives have had trouble
United Nations of Identity Management
Posted on July 17th, 2009 No comments
Digital Transactions-“The new guidelines provide greater specificity about wireless network security, an area where there are known vulnerabilities that hackers have exploited, most famously in the TJX data breach,” Tom Wills, senior analyst of security for fraud and compliance at Javelin Strategy & Research, tells Digital Transactions News via e-mail.