Moving to Amazon Web Services (AWS) can offload significant IT resource and cost burdens. However, you can't offload the ultimate responsibility for the security, privacy, and compliance of your data.
This whitepaper delves into an approach to migrate sensitive data into AWS environments while ensuring...
Home Depot says an estimated 56 million payment cards were exposed in a data breach at its U.S. and Canadian stores. The retailer says an investigation revealed the breach involved custom-built malware not used in other cyber-attacks.
What's the toughest challenge the U.S. faces when it comes to EMV? Randy Vanderhoof of the EMV Migration Forum points to getting POS software and terminals certified for EMV transactions. Find out what other hurdles he identifies.
The FTC has granted final approval of its settlements with Fandango and Credit Karma on charges that the companies failed to secure the transmission of millions of consumers' sensitive personal information from their mobile apps.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
The National Institute of Standards and Technology should use the cryptographic community to help vet the advice it gets from the National Security Agency when creating cryptography guidance, a panel of prominent experts recommends.
Advanced payments technologies, such as chip cards, tokenization and end-to-end encryption, are effective at stopping card fraud at retailers, but only if they're used as part of a comprehensive threat-mitigation plan, says First Data's Paul Kleinschnitz.
In today's mobile world, enterprises want engaged and connected employees. That's one of the
reasons they are letting employees use their own devices to access email. People who can
access work from a personal device are always going to be connected to the office. However, the
most popular smart phones are not...
Ellen Richey of Visa reviews card fraud-fighting trends for the year ahead, including the U.S.'s migration toward EMV, greater use of tokenization and heightened fraud detection.
The OpenSSL Project is receiving new funding to support its operations following the Heartbleed exploit that exposed a flaw in the cryptographic tool that's used to provide communications security and privacy online.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
A group of noted cryptographers, academics and business leaders will provide an independent assessment of the way the National Institute of Standards and Technology develops cryptographic standards and guidelines.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Paul Kleinschnitz, general manager of payment processor First Data's cybersecurity solutions team, says there are plenty of technologies to address payment card security, but cyberthreat awareness is still lacking.
The burden of complying with regulations can be stressful, but the cost of a breach is too high to ignore.
Whether you are a HIPAA-covered entity or business associate, the changes to HIPAA through the HITECH Act have expanded the privacy and security regulations affecting your organization, as well as penalties...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.