Five significant trends, including the mobile revolution and the use of big data, will influence the future of cybersecurity, says Allan Friedman, co-author of a new book on the subject.
Target now says personally identifiable information for up to 70 million of its customers was likely exposed in the December breach that also compromised some 40 million U.S. debit and credit cards.
The House of Representatives approved a bill Jan. 10 that would require notification of consumers within two days of discovery of breaches of data on Obamacare's health insurance exchanges.
Federal agencies audited by the Government Accountability Office showed inconsistent responses to computer breaches involving personally identifiable information.
As the elected auditor of public accounts in Kentucky, Adam Edelen is on a campaign of sorts to get the Bluegrass State to become the 47th state to enact a data breach notification law.
Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they've been compromised, says Paul Royal, associate director of the Georgia Tech Information Security Center.
The House of Representatives is scheduled to vote Jan. 10 on two Republican bills addressing breach notification requirements and data security for Obamacare's HealthCare.gov website and health insurance exchanges.
Intel is changing the name of its McAfee line of security products to Intel Security. The name change follows the badmouthing of McAfee products by founder John McAfee, who sold his company to Intel in 2011.
Training that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
The new year's top trends in background screening can be summed up in two words: legal and compliance. Les Rosen of Employment Screening Resources offers expert tips for more effective screening.
House Majority Leader Eric Cantor plans to push new legislation aimed at bolstering the security of the HealthCare.gov website as part of a GOP call for "greater transparency" overall for Obamacare.
As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.
To help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014.
The hacking of Skype's Twitter account, Facebook site and blog serves as a reminder that organizations must diligently protect their credentials, a cybersecurity expert says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.