Red Carpet Treatment In Trendy Tribeca

Sausner, Rebecca
February 2008
Bank Technology News;Feb2008, Vol. 21 Issue 2, p13
Trade Publication
The article offers information about the film premiere of "The New Face of Cybercrime" in the U.S. It is an occasion wherein bank chief information officers (CIOs) and chief information security officers (CISOs) were invited to walk on the red carpet during a film premiere. The film features lines of scrolling up a screen, and interviews with a real-life hacker talking about how easy it is to get a person's Social Security number.


Related Articles

  • Indian Data Breach Traced to China.  // Information Management Journal;Jul/Aug2010, Vol. 44 Issue 4, p14 

    The article features results a study that investigates the data breach in India. Researchers discovered that cyber thieves penetrate into Indian government's computers came from China. According to researchers data thieves are able to steel classified documents, like the Indian missile systems...

  • Cyber crime spreads its viruses. Reed, David // Data Strategy;May2009, Vol. 6 Issue 5, p9 

    The article focuses on the increase in cyber criminal activity in the internet, where attacks can be launched from places like Russia and Brazil. The basic toolkits of phishing are reportedly being marketed as legitimate products and can be bought for 2 dollars. It is stated that many computer...

  • Malevolent Motivations? Niblett, Gareth // ITNOW;Summer2012, Vol. 54 Issue 2, p25 

    There is a lot more to online activistists, such as Anonymous, than the mainstream media would have us believe, says Gareth Niblett, Chair of BCS ISSG.

  • How CISOs can keep up security best practice in a threat landscape in flux. Saran, Cliff // Computer Weekly;4/3/2012, p11 

    The article explores data security issues faced by corporate chief information security officers (CISOs) in light of widespread personal computing. The results of several studies are presented regarding the threats of data loss, hacking, and other cybercrime in various sectors, including the...

  • You might be next. Armstrong, Illena // SC Magazine: For IT Security Professionals (15476693);Jul2011, Vol. 22 Issue 7, p4 

    The author reflects on the important role of a chief information security officer (CISO) in the security of business enterprises. She notes that a CISO is in charge of risk management and incident response plan. She attributes the decision of Sony to hire a CISO to multiple data breaches. Intel...

  • New attacks require different defense strategy. GREENWALD, JUDY // Business Insurance;7/4/2011, Vol. 45 Issue 27, p20 

    The article discusses several strategies that may be used by companies or organizations to prevent hackers from gaining access to their data and computer systems. According to Michael R. Overly of law firm Foley & Lardner LLP, the company's vulnerabilities should be evaluated. Larry Clinton of...

  • Beat online criminals at their own game.  // Computer Weekly;3/31/2009, p10 

    The article reports that former U.S. national cyber security advisor Howard Schmidt says that businesses will fail to protect their data unless they begin to understand how cybercriminals work. Schmidt, who is president and chief executive of Great Britain-based Information Security Forum (ISF)...

  • State Drug Database Held Hostage.  // Information Management Journal;Sep/Oct2009, Vol. 43 Issue 5, p6 

    The article reports on a cyber theft case which left Virginia's electronic prescription drug database a hostage, after a hacker demanded a 10 million dollar ransom after claiming to have gained 35 million prescription drug records of the state. It mentions that the database include records of...

  • The rise of cyber-crime families. Prince, Brian // eWeek;7/21/2008, Vol. 25 Issue 22, p16 

    The article offers information on the Cyber-crime organizations in the U.S. These group collaborate around a classic Mafia-style model. Research shows that the organization's computer threats have grown more sophisticated wherein individual hackers are replaced with a well-structured...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics