In the near future, financial institutions will have new opportunities for service in emerging payments. How they define their roles, however, will depend greatly on steps they take now to put a stake in the ground.
Online risks, card skimming and data leakage are the top threats to Asia Pacific and Indian banks, and financial institutions are just starting to implement security measures and regulations to combat the growing threat landscape, says Gartner's Matthew Cheung.
"It is clear that Internet technology represents the moment of a change equivalent to the change brought on by the printing press and the steam machine," says Kosta Peric of SWIFT.
Medtronic's announcement that it's launching an "in-depth risk/benefit analysis" following an "ethical hack" of one of its insulin pumps is good news. We hope that Medtronic and all other medical device manufacturers launch long-overdue, aggressive efforts to improve medical device safeguards.
The Department of Veterans Affairs expects to accommodate the use of in excess of 100,000 iPads and iPhones within 18 months, including a mix of government-owned and personal mobile devices, says Roger Baker, CIO.
As it seeks information from vendors about implementing a more robust mobile device management system to ensure security, the Department of Veteran's Affairs has reported its first case of a stolen iPad.
Roger Baker, CIO at the VA, says desktop computers will eventually phase out, as mobile devices become predominant channels for communication and work. That evolution has made plans for ongoing mobile security a priority for organizations that cross every business sector.
The BlackBerry disruption strikes at a core IT security precept: availability. Yet, as cybersecurity and IT architecture practitioner Winn Schwartau points out, it also raises the less-often talked about proposition of accountability.
What fraud and security issues does Paul Smocer, the new president of BITS, see as being top concerns in the coming year? Mobile payments, social media, and a strong need for institutions and organizations to comply with existing guidance top the list.
Roger Baker, CIO at the Department of Veterans Affairs, outlines the department's mobile device security strategy, providing details on the rollout of iPhones and iPads.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Two recent major breach incidents call attention to the value of encrypting backup tapes. A new survey shows how many organizations are taking this precaution.
Giving employees the chance to use their own mobile devices on their employers' network isn't necessarily given. That's what Delaware Chief Security Officer Elayne Starkey found when the state implemented a new program to allow the secure use of personal devices on state networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.