The billions of dollars worth of HITECH Act incentives available to hospitals and physicians using electronic health records are serving as a powerful catalyst for information security as well.
A federal judge sentenced a Colorado man to two years in prison for trying to inject malicious code into a Transportation Security Administration computer used to screen for potential terrorists.
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
From ATM skimming to the Zeus malware, credit and debit cards are under increased attack by fraudsters, and organizations need to step up their efforts to protect their customers - and themselves. What steps can you take to avoid being the next payment card fraud victim?
Join Kimberly Peretti, former senior...
As TJX, Hannaford and Heartland have taught us, incident response isn't just about reacting to your own institution's security breaches - it's about what happens when your card processors, merchants and vendors are compromised.
Register for this session for insight on:
How to immediately respond to a payment...
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
At a time when resources are tight and risks are abundant, many banking institutions are going mobile.
This is one of the findings of the recent Banking Confidence Survey, wherein 41% of respondents say their immediate business objectives include investment in new and enhanced services such as mobile banking. Their...
The crime of deception is now even more deceptive.
Multi-channel fraud - schemes that are launched simultaneously via telephone, Internet, in person and via mail - is a growing concern for financial institutions. And the linked crimes aren't always easy to spot.
In this exclusive interview, security expert Diana...
Howard Schmidt, a recognized information security thought leader, offers exclusive insights as new president of the Information Security Forum.
Schmidt, a household name in information security circles since his days as CISO and information security leader at Microsoft and eBay, discusses the global war against...
Interviews Shed Light on Topics of Unique Interest to Banking/Security Executives
The annual RSA Conference is a showplace for the who's who of security solutions vendors. The event showroom is lined with scores of the industry's leading vendors - no one individual could hope to see them all.
So, the Information...
Privacy breaches can have devastating impact upon organizations if they do not respond to them well - and ensure that their third-party service providers are also adequately protected. Register for this webinar to learn:
Why there are more privacy breaches than ever before
How to plan for - and respond to - a...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.