Value? It's coming in more shapes and forms than ever before, says Kosta Peric of SWIFT. So how can financial institutions embrace these new values and provide products and services that meet growing consumer demand?
Social media and new economies are changing the payments landscape, giving consumers more control over their buying experiences. As consumers take on more, how much will banks and service providers relinquish?
Healthcare organizations should carefully document all necessary breach investigation and notification actions and responsibilities to avoid chaos when an incident occurs, says Dawn Morgenstern, privacy official at the Walgreens national drugstore chain.
2011 has offered quite a number of tough lessons for security professionals. Here at (ISC)2, where security education is our focus, the close of another year raises the old teacher's question: "What have we learned, class?"
One key reason why encryption isn't more widely used in healthcare is that some information technology specialists have outdated perceptions about the technology, contends security expert Melodi Mosely Gates.
The bring-your-own-device trend is increasing, but work-place policies are not. ISACA's Ken Vander Wal says low employee awareness and the absence of any BYOD policy are to blame. So what can organizations do to fill their security gaps?
"National and government CERT managers should use more ... external sources of incident information and additional internal tools to collect information to plug the gaps" says ENISA Executive Director Udo Helmbrecht
With the extension of ENISA's mandate into 2013 by the European Parliament & Council, the agency can continue to educate and collaborate with other nations on cybersecurity issues, an area of constant importance.
The team at the European Network and Information Security Agency identified 50 security threats that exist within the new web standards and sent recommendations for how they should be addressed to W3C.