To gain a picture of how organizations are contending with changing technology and security, SafeNet undertook an extensive survey. The findings offer insights into current market realities, and their implications for security executives.
This survey discusses:
If faith in the perimeter still exists;
How...
British Prime Minister David Cameron reportedly plans to lobby U.S. President Barack Obama to criticize technology companies that offer encrypted communications that cannot be cracked by law enforcement or intelligence agencies.
After facing backlash from Internet users across the nation, the Indian government has ordered the unblocking of 32 websites that were blocked under 69A of the IT Act for allegedly hosting ISIS propaganda.
A group of about 20 state attorneys general has sent a letter to JPMorgan Chase demanding the bank reveal far more details about its breach last year that exposed information related to 76 million households and 7 million small businesses.
Last year, several high profile security incidents occurred at healthcare organizations where a HIPAA Risk Assessment (HSRA) had previously been conducted. This should provoke some pointed questions: Was the HSRA comprehensive enough? Was the remediation plan implemented correctly and in a timely manner? Was an...
India currently has 22,000 information security professionals, but needs 800,000 by 2020. Can the government's scheme bring in the necessary skills? What is the risk to business if these roles aren't filled?
Following the Paris terror attacks, the French government plans to strengthen its surveillance laws, while the British prime minister has promised to allow intelligence agencies to penetrate any encrypted communications.
The president's proposal would provide stronger privacy protections than legislation passed by the House in the last Congress, and furnish targeted liability protections to businesses that share cyberthreat information.
Cyber insecurity is the leading threat to growth in the banking industry. But as demonstrated by recent major breaches, merely following
regulatory rules will never keep pace with the constantly growing and changing cyber threats.
Download this white paper to learn:
How to stop advanced threats.
Protect...
The identity federation standard, Security Assertion Markup Language, or SAML, enables single sign-on (SSO) and has a wide variety of uses for businesses, government agencies, non-profit organizations and service providers. With the wealth of internal and external web applications and services, federated identity is...
The sheer volume of data moving between agencies, contractors and citizens to support collaboration is staggering and impressive. Moving and keeping this data safe becomes a top priority, especially with the growing number of computers, devices, systems and applications. Agencies must determine how to handle multiple...
The GAO says the Department of Homeland Security has failed to develop a strategy to secure computers in federal facilities that monitor and control building operations, opening a potential door to security breaches.
Information security experts are calling on Google to rethink its patch priorities after it declines to fix a critical component that runs on Android 4.3 "Jelly Bean" and older devices, leaving an estimated 930 million mobile devices at risk.
President Obama's call for enactment of a national data breach notification law has been widely welcomed by business groups and privacy advocates, but their endorsements come with a big proviso: What's in it? The White House hasn't furnished details.
ATM vendors are working together to enhance threat information sharing and ensure hardware and software compatibility. In part two of an exclusive three-part interview, three leading ATM manufacturers explain why collaboration has become so important.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.