Too many of today's firewalls are out of date and opening organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
So, how do we quickly get to the next-generation firewall - and what are the key qualities it will need to embrace?
In an interview about the future of firewalls, King...
Banks, government agencies and healthcare providers have upped their efforts to assist consumers after an ID theft incident. But much more needs to be done. One ID-theft recovery expert shares her thoughts about areas in need of improvement.
Pradeep Moudgal says the U.S. is migrating toward EMV. But how much new investment are card issuers going to have to make, and what steps does the collective industry need to take to ensure the transition from the mag-stripe to the chip is a smooth one?
Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.
Servers at Virginia Commonwealth University were recently hacked, potentially exposing Social Security numbers for more than 176,000 faculty, staff, students and affiliates at the university and the VCU Health System.
Winning senior executive support for information security spending requires "a solid business case of justifications," says Christopher Paidhrin, security compliance officer at PeaceHealth Southwest Medical Center.
The bust of six Estonians for one of the biggest online frauds ever is reminiscent of another type of organized crime: drugs. Despite the similarities, there's one big difference between drugs and online crimes.
Mobile banking is a 'must-have' today, but the foray into this new financial-services arena comes with risk. Consistent review and implementation of security layers and controls is the only strategic way to tackle emerging mobile offers.