ThreatMetrix's Taussig says strong authentication should be part of every financial institution's layered security approach. And according to expected changes to the Federal Financial Institutions Examination Council's 2005 online authentication guidance, that means proven measures to enhance device identification.
Five leading healthcare organizations are collaborating to demonstrate the secure national exchange of health information, hoping to pave the way for others, says James Walker, M.D. of Geisinger Health System.
Michaels Stores Inc. says POS PIN pads at nearly 90 stores in 20 states were tampered with, exposing debit and credit cardholders to fraud. Now the chain says it is replacing PIN pads at the majority of its 964 U.S. stores.
Domain name systems are among the least known - but most important - security vulnerabilities for organizations in all sectors. But government agencies in particular need to be concerned about DNS security to protect their e-government initiatives.
In an exclusive interview on DNS security, Mark Beckett of Secure64...
The legislative blueprint for comprehensive cybersecurity legislation would strike a critical balance between strengthening security, preserving privacy and civil liberties protection and fostering continued economic growth, an official says.
Five Democratic senators point to inconsistencies in corporate Security and Exchange Commission reporting, investor confusion and the national importance of addressing cybersecurity for the need of new guidance.
U.S. government agencies are eager to gain the service and cost efficiencies of cloud computing, but the Government Information Security Today survey finds they have serious reservations about information security in the cloud.
"Raising the security awareness of your workforce is your best defense against having a breach incident," says David Holtzman, who's on the federal team that enforces the HITECH Act breach notification rule.
Plan would nationalize breach notification law, set penalties for cybercrimes and protect businesses from lawsuits that share cybersecurity information with DHS as well as promote the use of cloud computing.