"Once you identify that person based on the unique characteristics of their face, you could then match it with other databases," privacy advocate Beth Givens says, referring to privacy gaps created by facial recognition technology.
"You can't have someone arrested for violating your policies," says former Bear Stearns CISO Jennifer Bayuk. "The question is: What did he do, and was there a policy that would have prevented the activity?"
Milton Callan, a former VP at Lockheed Federal Credit Union, will never work at a federally-insured institution again after being convicted of embezzlement.
The Texas wildfires, which over the past seven days have consumed over 9,205 acres, are a wake-up call to financial institutions to review their business continuity and disaster recovery plans.
Leon Rodriguez, formerly chief of staff and deputy assistant attorney general for the Department of Justice Civil Rights Division, is the new director of the Department of Health and Human Services' Office for Civil Rights.
The inability of the Department of Homeland Security to implement appropriate IT and application controls has placed at risk the confidentiality, integrity and availability of DHS's financial and operational data, according to an audit conducted for the department's inspector general.
Responding to a request for ideas on how to update the Common Rule, which provides guidelines for research on human subjects, the Privacy and Security Tiger Team says a key issue is how to define "research."
"The tech fellows will be given the challenge of working with the projects and complex systems that are only available when working in federal IT," Federal CIO Steven VanRoekel says. "This is the competitive advantage that the federal government holds against the private sector."
Intelligence expert Terry Roberts says cyber intelligence, a new approach to IT security, could make significant gains in the coming year. "The good thing is, this isn't really rocket science," says the chair of the Intelligence and National Security Alliance's Cyber Council.
The Reserve Bank of India issued guidance in April, 2011 for banks to mitigate the risks of use of information technology in banking operations. Here is an overview of the nine topics specifically addressed by the guidance.
"The biggest change these guidelines are bringing is in making information security a board level issue for all banks," says Kamlesh Bajaj, CEO of DSCI.
Most consumers understand the need for security on laptops and PCs. On mobile devices, the thinking is not the same. "Their behavior is much riskier," says Markus Jakobsson, online security expert.
HHS Secretary Kathleen Sebelius has proposed new rules that would expand the rights of patients to access their health information through the use of health information technology.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
The key...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.