Responding to today's cyber attacks isn't the challenge for Indian banking institutions. But prosecuting these crimes is, says KK Mookhey, a security expert with deep banking experience. Current laws just don't serve as enough of a deterrent for attackers.
The Internet is inherently insecure, and the only way to ensure today's evolving information systems is to build them upon three pillars of trust. This is the premise of Mike Ozburn, Principal at Booz Allen Hamilton, which has just authored a new white paper about these pillars.
Parts of the American Recovery and Reinvestment Act of 2009 and the Health Care and Education Reconciliation Act of 2010 are jump-starting an IT revolution in healthcare. The rules are incenting physicians and hospitals to digitize health records and are promoting digital exchange of information among doctor's...
Businesses today need a technology infrastructure that is highly available, runs on a secure network, and is protected against data loss and unauthorized access. A reliable, responsive, and secure infrastructure is critical to business efficiency and growth. A small chink in your technology armor can damage...
Lengthy downtime, data losses, and security breaches can harm business results, bringing business to a halt: stopping the flow of orders, reducing sales revenue, and interfering with the supply chain. These downtimes could potentially impact a company's ability to compete with other organizations that were unaffected,...
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
Pay-at-the-pump card skimming is back, just in time for spring break; and Editorial Director Tom Field shares thoughts from Phoenix about BAI's recent Payments Connect conference.
RSA Conference 2011 was held recently, and Information Security Media Group was on hand to participate in the event in several unique ways. Check out our exclusive video interviews with industry thought-leaders, as well as our "Faces of Fraud" briefing.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.