The UK Information Commissioner's Office says that neglecting to keep software security up to date and failing to encrypt online communications are among the top cybersecurity vulnerabilities at government and private-sector organizations.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Third-party risks and the Fed's plans for emerging payments will be highlighted at ISMG's Fraud Summit Chicago on May 14. How banking institutions and retailers are expected to respond to new risks posed by external parties will be a focus for our keynote panel.
Card breaches at retailers such as Target and Neiman Marcus will likely be catalysts for improved cyberthreat intelligence and information sharing across the banking and retail sectors, says Mike Braatz of ACI.
Police have withdrawn their allegation that a man arrested for fraud in Georgetown, Texas, also may have been involved in the Target Corp. data breach last December that impacted millions of customers.
"Security as a business enabler" was the mantra echoing through the recently concluded 2014 Infosecurity Europe conference in London, a message that should have been heeded by top executives at retailer Target last year.
On the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response.
Individuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service.
Using technology to devalue card data, and leveraging data analytics, are essential to efforts to crack down on fraud, Visa's Ellen Richey said in her keynote presentation at the San Francisco Fraud Summit.