The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
The unit of the Department of Health and Human Services that administers the Medicare program isn't consistently complying with the breach notification rule that HHS enforces, a new report shows.
"A cyberattack perpetrated by nation states or violent extremists' groups could be as destructive as the terrorist attack on 9/11," U.S. Defense Secretary Leon Panetta says. "Such a destructive cyber-terrorist attack could virtually paralyze the nation."
Do we have any reason to believe that any targeted banking institution will be better prepared next week to ward off a distributed denial of service attack like those that rocked three banks this week?
Suspending the HITECH Act's electronic health record incentive program, as suggested by four GOP congressmen, is a misguided idea that could hamper efforts to cut healthcare costs and jeopardize data security.
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
With President Obama on the hustings, his national security staff back at the White House is busily addressing cybersecurity matters that should, but aren't, making it to the presidential campaign.
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.
Lost and stolen unencrypted mobile devices are reoccurring culprits in data breaches. So why isn't the use of encryption more widespread? And how are organizations ramping up mobile security?
"Given the gravity of the threats we face in cyberspace, we want to get this right in addition to getting it done swiftly," White House spokeswoman Caitlin Hayden says of a proposed executive order to strengthen critical infrastructure IT.
A wave of distributed denial of service attacks on banks raises the question: Should the owners of the nation's critical information infrastructure, when assessing risk, be held to a higher standard because society relies on them to function?
A group of Republican senators warn President Obama not to issue an executive order to create voluntary IT security standards, saying such action would aggravate the existing divide among lawmakers that prevented a vote on the Cybersecurity Act.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.