Discussing Verizon's new report on the state of PCI compliance, PCI expert Jen Mack says payment card security today is "disappointing," and global merchants are at serious risk of new data breaches.
Information security poses a major challenge to the widespread adoption of cloud computing, yet the Cloud Security Alliance, an association of cloud stakeholders, sees the cloud as a provider of information security services.
Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.
Mobile apps and smartphone security are increasing global concerns. But Dr. Giles Hogben of ENISA says mobile malware mania is a bit overhyped, since mobile is actually more secure than most other platforms currently on the market.
Want to reduce ATM skimming incidents? Heed the advice of Seattle-area banking institutions and law enforcement officials, who have gleaned a half-dozen clues from that region's recent fraud investigations.
The breach earlier this month of certificate authority DigiNotar could prove to be the worst security event ever to happen on the Internet because it threatens, at its core, a fundamental principle of Internet transactions - economic and social - trust.
"It's important, in that climate today, where we have very sophisticated cyberattacks taking place, to have the ability to do a fairly comprehensive analysis on the threat space," NIST Senior Computer Scientist Ron Ross says.
Risk management expert Frances McLeod says investment banks such as UBS struggle with balance between risk management and making money. "There is a bit of a conflict in the culture," she says.
International communication and public-private partnerships are the keys to cybersecurity in the financial space, according to the Department of Homeland Security and the Financial Services - Information Sharing and Analysis Center.
Intelligence expert Terry Roberts says cyber intelligence, a new approach to IT security, could make significant gains in the coming year. "The good thing is, this isn't really rocket science," says the chair of the Intelligence and National Security Alliance's Cyber Council.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
Government officials have confirmed a potential threat by al-Qaida against the United States as the nation approaches the 10th anniversary of the Sept.11, 2001 terrorist attacks that hit the World Trade Center and Pentagon.
The Treasury Department's Office of Terrorism and Financial Intelligence has worked to prevent anti-money laundering and illegal cash flow from reaching the hands of terrorist groups, but more needs to be done to further mitigate risks, says Treasury Assistant Secretary Daniel L. Glaser.
Doug Johnson of the ABA and FS-ISAC says banks and commercial customers are improving efforts to catch and thwart incidents of corporate account takeover, a sign that the industry is moving in a positive payments direction.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.