Cybersecurity legislation that cleared the House of Representatives last year, and that President Obama opposed, will be reintroduced Feb. 13 by the Republican chair and Democratic ranking member of the House Select Committee on Intelligence.
Outsourcing to the cloud poses new risks, especially for card data. The PCI Council addresses those risks in its just-released cloud security guidance, and Bob Russo offers exclusive insights.
The compromise of hundreds of payment cards, apparently tied to fraud worldwide, has been linked to a network hack affecting an Arizona supermarket chain. And the attack involved a new kind of malware, the chain says.
Visa recently warned card issuers to be on the lookout for an upswing in ATM cash-out schemes. But what can be done to thwart this type of fraud? A Visa executive provides specific tips.
The new, much more objective guidance for reporting breaches that's included in the HIPAA omnibus rule will result in an increase in notifications, predicts privacy law expert Marcy Wilder.
New PCI data security guidance for e-commerce advises merchants to step up compliance efforts in the online environment to ensure card data is protected across the payments chain.
In the aftermath of a data breach last year that affected 780,000 individuals, Utah legislators are considering a bill that would mandate state agencies identify and implement best practices for protecting data.
"We felt that it was very important to come out with this and say this was how easy it is for them to break into any U.S. company, and here's how they're doing it," The New York Times' Nicole Perlroth says.
"Cyber represents as big a threat to this country as any significant threat," Chuck Hagel says at his confirmation hearing to be defense secretary. "It's insidious, a quiet kind of threat we haven't quite seen before. It can paralyze a nation in a second."
A quick glance at a new survey suggests that businesses care more about protecting the privacy of their customers than governments do about their citizens. That's what the numbers say. But the numbers don't necessarily tell the whole story.
Using technology to prevent breaches is insufficient. Security leaders also must address the human factor, making sure staff members receive appropriate training on clear-cut policies - before it's too late.
"We're going to have to find a way to address the interests of other states to ... find common ground," Secretary of State John Kerry says. "We're just going to have to dig into it a lot deeper. I don't have a magic silver bullet to throw at you here today."
By hacking the website of the United States Sentencing Commission, the hacktivist collective Anonymous is blaming the U.S. government for the suicide of Internet activist Aaron Swartz.
Some critics feel the Obama administration is giving the Department of Homeland Security too much authority on leading cybersecurity initiatives. DHS's deputy undersecretary for cybersecurity explains why he thinks that view is wrong.
As enterprises move more applications to the cloud, continuous monitoring will play a greater role in assuring the software is patched in a timely manner, says John Streufert, DHS director of federal network resilience.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.