With the clock ticking on the current legislative session, and with his retirement just months off, Sen. Jay Rockefeller is mulling whether Congress needs to enact legislation to regulate how airlines use and protect passengers' private information.
ATM manufacturers Diebold and Wincor Nixdorf are laying the groundwork for a new industry group focused on thwarting ATM crime. While experts say the time is right for a group like this, it will need industrywide buy-in to be successful.
As the Target breach demonstrated, boards of directors will be held accountable when their organizations are breached. Attorney Kim Peretti offers tips on how to educate boards about security issues.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Authorities in Ireland have accused some private investigators of tricking government employees into revealing personal details about credit union customers, in violation of EU data protection laws.
Nonstop data breach notifications take a psychological toll, driving executives and consumers alike to alter their behavior for the worse. Here are three ways for businesses to battle data breach fatigue.
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind as revealed by former NSA contractor Edward Snowden.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Internet hygiene is not up to par, say cybersecurity experts Tom Kellermann and Rod Rasmussen, who explain why bad hygiene has led to increased botnet traffic and malware infections.
A Tennessee utility has sued its bank after a $327,000 account takeover incident. This new case shows why institutions must go above and beyond when it comes to detecting and thwarting fraud losses.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Finding a common theme from the Black Hat USA conference isn't easy, but a few emerged - simplifying complexity and developing community-based solutions - from sessions and discussions with top cybersecurity experts.
Cyber-historian Jason Healey contends the U.S. government does not want peace in cyberspace so it can conduct more attacks and exploitations. Instead, he says the feds should make the Internet's economic benefits its top priority.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.