This week's top news and views: Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.
Mobile and online P2P services offer banks and credit unions a competitive edge, and a new Aite report proves internal fraud is more damaging than most banks realize.
The NSA looks to expand its cybersecurity, science and engineering workforce. "Our need for these skills is enormous; therefore, we need to be using cool high tech tools," says Kathy Hutson, agency associated director for human resources.
On Jan. 14, a new workgroup advising federal regulators dug into the difficult task of figuring out whether a presidential council's recommendations for electronic health record interoperability are feasible.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.