Wikipedia.org founder Jimmy Wales pledges to shutter the online encyclopedia from midnight Tuesday to midnight Wednesday to protest anti-piracy legislation before Congress that he contends would threaten Internet freedom if enacted.
Cybersecurity Coordinator Howard Schmidt recognizes the need to battle online piracy to protect U.S. intellectual property but contends legislation before Congress to do just that would unacceptably curtail Internet freedom and increase cybersecurity risks.
People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
Cyberhackers are increasing their efforts to target online credentials. And phishing attacks waged against accountholders at Chase in the U.S. and Barclays in the U.K. have made it clear that banking accounts are the target.
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many institutions fail when it comes to addressing this most obvious security risk?
Researchers say the Ramnit worm, which has defeated two-factor authentication measures used to protect bank online accounts, is now targeting the popular social media site Facebook.
When your site processes more transactions annually than the London Stock Exchange, you'd better care deeply about breach prevention, says Ionut Ionescu, Head of Threat Management at Betfair.
Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
A 17-year-old was slapped with a 60-day jail sentence after he was busted for skimming credit and debit details while working the drive-thru window at a McDonald's restaurant in Olympia, Wash.
A breach is a disaster, says business continuity specialist Ken Schroeder. So organizing an effective breach-response team does not require a reinvention of the wheel. What it does require is a holistic approach.
A risk analysis, as required under the HIPAA Security Rule, is a critical and foundational component of an effective risk management process that helps covered entities, and their business associates, to perform their mission and protect the health information entrusted to them.
The National Institute of Standards...
It's no longer just about mobile banking. Mobile technology today is deployed by leading-edge institutions for out-of-band user authentication, transaction verification and to help prevent fraud via real-time security alerts.
How can your institution crack down on fraud and maximize its mobile investment?
Join...
As part of the updated FFIEC Authentication Guidance, U.S. banking regulators mandate that financial institutions conduct periodic risk assessments of their electronic banking services.
But in the face of evolving threats, a growing online customer base and emerging mobile technology, what is the most effective...
John Carlson sees the evolution of technology introducing new threats to financial institutions. So, how will BITS' new VP of cybersecurity and fraud prevention help banks mitigate those risks?
How much do you know about the goings on in government information security over the past 12 months? Take our quiz to see how much you recall about occurrences reported by GovInfoSecurity in 2011.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.