The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
Google and Facebook are in the mobile payments arena. But consumers still expect their banking institutions to secure the mobile wallet, says Alphonse Pascual of Javelin. What role must banks play?
Lost and stolen unencrypted mobile devices are reoccurring culprits in data breaches. So why isn't the use of encryption more widespread? And how are organizations ramping up mobile security?
A wave of distributed denial of service attacks on banks raises the question: Should the owners of the nation's critical information infrastructure, when assessing risk, be held to a higher standard because society relies on them to function?
A Government Accountability Office report says the FDA needs to develop a better strategy for monitoring information security problems in medical devices. Find out what GAO recommends, and why others agree.
The Government Accountability Office justifies the need for further action, noting that malware variants aimed at mobile devices have risen to 40,000 from 14,000 in less than a year.
The PCI Security Standards Council has issued new guidelines on mobile payment acceptance security. What are the key recommendations? The council's Bob Russo and Troy Leach discuss the new guidance.
The Food and Drug Administration has proposed several ways to improve post-market medical device surveillance for adverse events and safety issues, including malware-related incidents. Find out the details of a new report.
As a result of the recent Apple-Samsung verdict, CISOs at organizations need to be mindful of where their software is being sourced from, says patent attorney Jim Denaro.
The iPhone 5 is coming, and so are a slew of new or upgraded smart phones and tablets. How should security leaders prepare for this new wave of mobility? Malcolm Harkins, CISO of Intel, offers advice.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Developing secure mobile applications is just one part of the process in creating new programs. Communicating how applications are secured is crucial in building IT security awareness among stakeholders.
Mike Mitchell, who serves as chairman of the PCI Security Standards Council, says mobile is a focus for leaders in the payment security space. So does the PCI Council expect emerging tech to influence the PCI-DSS?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.