Home Depot says an estimated 56 million payment cards were exposed in a data breach at its U.S. and Canadian stores. The retailer says an investigation revealed the breach involved custom-built malware not used in other cyber-attacks.
It's hard to believe, but a year has already passed since the deadline for the HIPAA Omnibus Final Rule went into place. Although the language is set, the full impact is still playing out.
Recent changes within the Office of Civil Rights (OCR) and its leadership have energized enforcement and changed what...
What's the toughest challenge the U.S. faces when it comes to EMV? Randy Vanderhoof of the EMV Migration Forum points to getting POS software and terminals certified for EMV transactions. Find out what other hurdles he identifies.
Breaches and other security emergencies can be strong catalysts for change, says CIO John Halamka of Beth Israel Deaconess Medical Center in Boston, which has made a number of moves to beef up data security.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
In today's mobile world, enterprises want engaged and connected employees. That's one of the
reasons they are letting employees use their own devices to access email. People who can
access work from a personal device are always going to be connected to the office. However, the
most popular smart phones are not...
Ellen Richey of Visa reviews card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
The OpenSSL Project is receiving new funding to support its operations following the Heartbleed exploit that exposed a flaw in the cryptographic tool that's used to provide communications security and privacy online.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
The burden of complying with regulations can be stressful, but the cost of a breach is too high to ignore.
Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through the HITECH Act have expanded the privacy and security regulations affecting your organization, as well as penalties...
With the news that several large technology companies are going to assist in funding critical open source projects such as OpenSSL following the Heartbleed exploit, security experts weigh in on the move.
A draft of revised guidance from NIST drops a cryptographic algorithm the NSA is said to have used to circumvent encryption that shields much of global commerce, banking systems, medical records and Internet communications.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.