Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
Where do time-strapped senior leaders go for education on cyber forensics and incident response? Carnegie Mellon University has a new option, and Dena Haritos Tsamitis explains its unique approach.
The Department of Veterans Affairs is ramping up its privacy and security training efforts and plans to eventually deny network access to those who have not had training within the past year.
Banking institutions have fought phishing and ACH fraud, but increasingly fraudsters are exploiting call centers. Where are the vulnerabilities and how can institutions fight back?
Customer awareness is important, especially as a fraud detection/prevention tool. Read how one sharp-eyed UPS driver recently helped foil an ATM skimming scam at a bank in New York.
An Oregon nursing assistant spent eight days in jail for invasion of personal privacy on Facebook. The case provides an eye-opening lesson about the consequences of misusing social media.
Increased use of mobile devices and social networking sites is feeding ID theft and fraud. What is the risky behavior that is to blame for the rise in ID fraud? A new study sheds light.
What skills are needed to be an effective fraud examiner? My short answer is that, as with any discipline, there are certain skills and areas of knowledge one needs to learn to be successful.
The privacy profession is evolving, says Kirk Herath, Chief Privacy Officer of Nationwide Insurance. For those who are new to the role, Herath offers three pieces of advice.
Commerce Undersecretary for Standards and Technology Patrick Gallagher sees the private sector, not government, taking the lead to develop tools, processes and standards to help safeguard IT systems and data in and out of government.
Imperva would neither confirm nor deny it helped defend the Vatican website from a hacktivist assault last year, but the IT security provider's director of security, Rob Rachwald, explains how such an attack was constructed and defended.
The need for qualified security pros is growing - but so is the Scholarship for Service Program, which helps students train for roles in government. Victor Piotrowski of the National Science Foundation discusses the opportunities.
"I'll probably be hanged for this, but I really believe the cloud can be more secure than what we do today," says Tom Soderstrom, chief technology officer at NASA's Jet Propulsion Laboratory.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.