Sen. Al Franken, D-Minn., will head a new subcommittee on privacy, technology and the law, said Sen. Patrick Leahy, D-Vt., who chairs the Senate Judiciary Committee.
From making payments online to depositing checks via iPhones and communicating through Facebook, financial institutions have introduced many new services to make their customers' lives easier. To maximize the impact of trends such as mobility and social media while minimizing their risk, institutions must be...
There's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants - they also can be abused.
Employment Screen Resources' Lester Rosen says there's no hotter trend in background screening than social media. But just as social networks can be used to screen applicants, they also can be abused.
Devising strategies for ensuring social media are not used in ways that violate patient privacy is one of the top trends for 2011, says Lisa Gallagher, senior director of privacy and security at the Healthcare Information and Management Systems Society.
Develop a strategy against the vulnerability of Web applications
Web applications are extremely flexible and valuable assets to any organization. But they're also vulnerable to threats like hijacking, splitting, forging and injection.
Read this white paper, "Designing a strategy for end-to-end Web protection",...
Healthcare privacy and security issues rose to the forefront in 2010 thanks, in large part, to the HITECH Act, which led to many new regulations as well as a public list of major health information breaches.
When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Mobile banking and social networks are expected to pose new security threats in the payments space; and one small-business advocate says it's time for regulatory reform to solve the corporate account takeover problem.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.