Incorporating new concepts such as security-control overlays and placing a renewed emphasis on information assurance, the forthcoming guidance is 'a total rewrite' from the 2009 version, NIST's Ron Ross says.
The future of security in payments remains unclear, says Nicolas Vedrenne of the Merchant Risk Council. But international collaboration will be critical, especially as infrastructures merge.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
If President Obama's second term were a movie sequel, I'd call it "Unfinished Business." It's time to step up and see through the cybersecurity initiatives Obama spoke about when he first took office.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
Organizations everywhere should be concerned about DDoS attacks. But most are too focused on compliance to pay enough attention to fraud and security fundamentals, says ENISA's John Walker.
Human genome sequencing can support groundbreaking research leading to improved treatments. But before genetic testing can become common, privacy issues need to be tackled, says Lisa M. Lee, who heads a presidential advisory panel.
The big breaches make the headlines, but the smaller attacks on merchants are the ones that ultimately benefit the fraudsters and hurt banking institutions most, says Wade Baker of Verizon.
TD Bank's October breach notification about two backup tapes lost in March is difficult to justify, legal experts say. As a result, the bank could face lawsuits, as well as state fines.
The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
"A cyberattack perpetrated by nation states or violent extremists' groups could be as destructive as the terrorist attack on 9/11," U.S. Defense Secretary Leon Panetta says. "Such a destructive cyber-terrorist attack could virtually paralyze the nation."
Do we have any reason to believe that any targeted banking institution will be better prepared next week to ward off a distributed denial of service attack like those that rocked three banks this week?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.