The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.
The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
High Roller malware attacks are the latest potential threats that point toward the need for layered security controls. What advice do banking/security leaders offer for responding to these attacks?
Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.
Boards of directors continue to overlook IT risk management, security and privacy as a top agenda item, says Jody Westby of Carnegie Melon CyLab. Where are the organizational gaps that need to be filled?
Global Payments Inc. says its data breach investigation is complete, and so far the incident has cost the company $84.4 million. What's next for the payments processor as it recovers from this breach?
Whether intentional or not, software features have the potential to leak sensitive information, corrupt data or reduce system availability. The National Institute of Standards and Technology's latest guidance aims to help organizations minimize vulnerabilities.
In the latest update, much was left unsaid about the Global Payments data breach. And if I were a Global customer or card-issuing entity, I'd have some serious follow-up questions.
The National Institute of Standards and Technology says intrusion detection and prevention software has become a necessary addition to the IT security infrastructure of many organizations.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.