A star-studded lineup of top administration officials including four cabinet secretaries and three other senior executives announced the new international strategy, emphasizing the importance of cybersecurity to American foreign policy.
The Obama administration's plan for a federal data breach notification policy is too vague to be effective, and it lacks teeth to penalize violators, according to experts who raise open questions about the proposal.
More than 30,000 enrollees in a Medicare supplementary insurance plan from Anthem Blue Cross are being offered free credit monitoring services after they were mailed notices that apparently displayed their Social Security numbers in the envelope window.
SWIFT's Gottfried Leibbrandt says conflicting regulatory mandates could further fragment the international payments market, if banks and governments don't align their strategies. Communication among governments, regulators and global financial institutions is critical.
India's data protection standards are already strong. But to be truly secure and world-class, then organizations must protect themselves above those standards, says Dr. Kamlesh Bajaj, CEO of the Data Security Council of India.
A star-studded lineup of top U.S. officials including four cabinet secretaries and three other senior executives announced the new international strategy, emphasizing the importance of cybersecurity to American foreign policy.
Executives from Apple, Facebook and Google will appear before a Senate panel to explain their companies' practices on collecting and using customer data from smartphones, Sen. Jay Rockefeller announces.
The National Institute of Standards and Technology has issued a draft of its most complete guide on cloud computing, and is seeking public suggestions on how to improve the document.
Regulatory compliance expert Harry Rhodes says it's essential to have a formal process in place for objectively assessing whether a security incident needs to be reported as a breach.
Experts say card issuers picked up on the Michaels card breach by employing strong transaction monitoring and behavioral analytics, proving that cross-channel detection tools are the best ways to curb growing card-fraud schemes.
ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.