What are some of the unique security challenges facing Asian organizations, and how can they meet them? Steve Durbin of the global Information Security Forum shares insight from new research.
A federal judge has dismissed a class action lawsuit filed against eBay in the wake of a 2014 data breach that exposed encrypted passwords and personal information for 145 million users.
Do CISOs need mentoring? Daniel Lohrmann shares insights on the importance of mentoring CISOs to enable them to spot growth opportunities and also to build up their interpersonal skills.
In the wake of a breach, most organizations struggle with a number of concerns related to response, mitigation and notification. While immediate and full disclosure of a breach, in theory, sounds like the most practical advice, it's not always the best move for every organization. The nature of the breach, whether the...
The House Judiciary Committee, in passing a tailored bill to end the NSA's bulk collection program of phone records, rejected amendments to expand privacy reforms to other government surveillance initiatives.
As the Gulf Information Security Expo & Conference enters its third year, event director Ayusha Tyagi discusses the event's heritage, objectives and key themes to be explored by security professionals this year.
What will it take for the security leaders of 2020 to be the true guardians of their enterprises? Daniel Lohrmann shares insight in a keynote address from the Gulf Information Security conference in Dubai.
A class-action suit filed by U.S. banks and credit unions that's pending against Target could prove fruitful for the banks and credit unions, says attorney Chris Pierson, chief security officer at invoicing and payments provider Viewpost.
Mention cloud services to healthcare IT insiders and responses will vary from caution and trepidation to earnest interest. The advantages of low cost, on-demand cloud-based services are clear. However, managing their use and matching an organization's developmental, compliance and risk requirements to the right...
The HHS Office for Civil Rights' much-delayed resumption of its random HIPAA compliance audit program is expected in the coming months. So now is the time to prepare. This session will cover the highest priority tasks that should be started immediately if not already underway to help lay the groundwork for a...
In this session, we'll highlight the major findings from Information Security Media Group's new national survey of healthcare information security leaders. For example, an overwhelming majority of respondents were confident their organization would "pass" a Department of Health and Human Services HIPAA compliance...
The PCI Council has just released PCI DSS 3.1, which calls for mothballing the SSL encryption protocol. What do security leaders need to know about the revised standard? Troy Leach of the council offers insights.
The dynamics of the world economy and the demands on governments at all levels put increasing pressure on organizations to reduce costs while seeking new opportunities to grow and differentiate their products and services. The pervasiveness of the Internet and mobile devices is fostering multi-channel customer...
Understanding the organization's maturity level as defined in the CGOC Information Economics Process Assessment Kit is a major step forward in the journey toward achieving real information economic balance. The next is defining the requirements for a robust information lifecycle governance (ILG) solution and any...
No one intentionally creates digital debris. We document as we collaborate; we create files, backups, databases, and applications; and we store photos, music, digital training programs, logs, and reports. We create that content at that moment imbue it with value and purpose. However, as circumstances evolve,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.