Smaller institutions could use some advice on security for mobile banking and cloud computing. But federal banking regulators apparently don't plan to issue technology-specific guidance.
The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
When asked about their computing habits, a majority of those surveyed say they never use the cloud, though their online habits show that nearly all of them do.
Cyberthieves are exploiting weaknesses in the U.S. payments infrastructure as an easy-to-travel avenue for access to intellectual capital, says risk consultant Bill Wansley. What can be done to stop them?
The final rules for Stage 2 of the HITECH electronic health record incentive program contain multiple provisions regarding privacy and security. Find out what experts have to say about the merits of the new requirements.
A second member of the LulzSec hacktivist group has been arrested in connection with last year's Sony Pictures Entertainment breach. Learn about the latest details from the FBI.
Cyber is part of our everyday lives. Still, in many cases, a natural - or perhaps an unnatural - divide exists between the virtual and physical worlds. This is especially true in the way we deal with crime.
Likening the government's seizure of domain names to that of printing presses, civil libertarians contend such actions could violate First Amendment free speech protections.
Information security leaders increasingly take risk concerns to their boards of directors. But do they accurately articulate their messages? Heartland Payment's CSO warns of the most common mistakes.
In recent weeks, federal officials have added 25 incidents affecting 215,000 individuals to the official tally of major healthcare information breaches. Learn all the latest details in a complete update.
A former emergency department employee of Florida Hospital Celebration allegedly inappropriately accessed more than 760,000 patient records to find traffic accident victims. Find out the details about his arrest.
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
The University of Texas MD Anderson Cancer Center has reported its second data breach in recent weeks involving an unencrypted mobile device. Find out the details.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
Some U.S. federal agencies seem to be going too far in monitoring their employees' communications activities on their government-issued laptop computers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.