Ellen Richey of Visa, keynoter at the April 29 Fraud Summit San Francisco, outlines key card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
The Government Accountability Office's Gregory Wilshusen is an empathetic IT security auditor, saying he understands why agencies don't always follow his recommendations. Read why.
Three years ago, trust on the Internet - or the lack thereof - focused, in part, on the faceless hacking groups such as Anonymous and LulzSec. Today, we have a face for this lack of trust, and it looks a lot like Uncle Sam and a Chinese Red Army cybersoldier.
Tech companies continue to respond to the Heartbleed vulnerability by issuing alerts and patches to mitigate potential data compromises. Learn the latest advice from Trend Micro and ICSA Labs, plus updates from Rackspace, Akamai and Bitcoin.
Technology companies Cisco and Juniper Networks have issued alerts about which of their products are vulnerable to the Heartbleed bug. Learn about the latest developments.
As news of the Heartbleed bug continues to spread, government agencies in the U.S. and Canada are issuing statements on the vulnerability. Find out the latest on this threat and what thought-leaders are saying.
The chief executive of the Finnish company that uncovered the Internet website vulnerability known as Heartbleed says security practitioners should rethink how they approach IT security by placing a greater emphasis on vetting software for vulnerabilities.
Security experts agree that the newly-discovered Heartbleed bug is a serious threat, but what are the specific risks, and how can they be mitigated? Thought-leaders offer insights and practical advice.
New revelations that the NSA meddled with RSA encryption tools is raising concerns about the security of offerings not only from RSA, but other security product vendors, too.
Fandango and Credit Karma have reached settlements with the FTC on charges that they failed to secure the transmission of millions of consumers' sensitive personal information from their mobile apps.
The No. 1 reason Congress, after five years of intensive efforts, has yet to enact comprehensive cybersecurity legislation is differences over how much liability protection to grant businesses to get them to share cyberthreat information.
Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
MasterCard and Visa have announced the formation of a cross-industry group that will work on improving U.S. payment security by advancing migration to chip cards as well as point-to-point encryption.
As organizations expand their use of encryption to help prevent breaches, they must improve their management of cryptographic keys, says Prakash Panjwani, senior vice president at SafeNet.
An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.