Revised guidance from the National Institute of Standards and Technology, SP 800-63-1, could help organizations protect themselves from a growing threat to their information assets: the insider.
As legal issues surrounding data breaches become increasingly complex, more organizations are turning to attorneys for post-breach response, says Lisa Sotto, a managing partner for New York-based law firm Hunton & Williams.
Save Mart, the Calif.-based supermarket chain, offers new details and an FAQ about the investigation into the payments card breach that now is estimated to impact hundreds of customers and accounts.
Michaels, Save Mart and Subway. Each of these companies was victimized by point-of-sale fraud, and security experts say the fraudsters' patterns offer valuable security tips to merchants and financial institutions.
Every organization likes its business continuity/disaster recovery plan before a disaster, says Al Berman of DRI International. But in the aftermath? Different story - and one that must be addressed in 2012.
BITS, the technology policy division of The Financial Services Roundtable, has just named a new VP of cybersecurity and fraud prevention. What's John Carlson's mission, and what's it mean to banks?
The firing of a hospital staff member who inappropriately accessed former Penn State football coach Joe Paterno's records sends a strong signal about the importance of protecting patient privacy.
Value? It's coming in more shapes and forms than ever before, says Kosta Peric of SWIFT. So how can financial institutions embrace these new values and provide products and services that meet growing consumer demand?
Dice.com reports a 79 percent increase in the total number of information security jobs posted to its site. What are the five hottest career prospects for aspiring pros?
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
The bring-your-own-device trend is increasing, but work-place policies are not. ISACA's Ken Vander Wal says low employee awareness and the absence of any BYOD policy are to blame. So what can organizations do to fill their security gaps?
Vulnerabilities in applications developed for the Commonwealth of Pennsylvania contributed to a major security breach a few years back, one that state CISO Erik Avakian does not want repeated.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.