QCR Holdings, a bank-holding company in Illinois, is moving to a new provider for commercial online banking. Why? To ensure QCR's banks conform to the FFIEC's updated authentication guidance, says CTO Michael Wyffels.
Karen Scarfone, who coauthored NIST's encryption guidance, sort of figured out why many organizations don't encrypt sensitive data when they should. The reason: they do not believe they are required to do so.
Because many merchant compromises result from badly installed or configured applications, payments acquirers, such as Chase Paymentech, are stepping up to help address point-of-sale security.
A report released by Gov. Nikki Haley says the hacker obtained the password when an employee of the Department of Revenue opened an e-mail containing malicious computer code.
NASA is ramping up efforts to encrypt all laptops following the recent theft of one containing sensitive personal information. Find out more about the U.S. space agency's encryption plans.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Like most enterprises, you're deployed encryption broadly to protect information and authenticate systems. Yet what impact does poor encryption management have on your business? According to Aberdeen, poor key management practices are costing organizations millions in security and compliance-related incidents, and...
Windows 8 is coming and includes security upgrades. How should security and technology leaders approach Microsoft's updated operating system? Forrester analyst Chenxi Wang offers recommendations.
As mobile transactions grow, so do the fraud risks. How is the Merchant Risk Council working with card issuers and merchants to address these threats? Nicolas Vedrenne of the MRC offers insight.
Nearly five years after announcing a competition to develop a new cryptographic hash algorithm, the National Institute of Standards and Technology announces a winner that was designed by a team of European scientists.
Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.
Citadel, one of the latest Zeus trojan variants, is a prime example of how hackers are pairing sophistication with practical conveniences. RSA's Etay Maor explains why that combination is so threatening.
Thales e-Security is pleased to present the 2011 Encryption Trends Study (United States) conducted by the Ponemon Institute. This study reveals how U.S. organizations are using encryption to protect their sensitive data and how the U.S. compares itself with other countries like Germany, United Kingdom, Brazil and...
LinkedIn's failure to comply with long standing industry standard encryption protocols jeopardized its users' PII, and diminished the value of the services, the class action federal lawsuit filed in northern California says.
Gartner's Peter Firstbrook, to illustrate the vulnerability of IT systems, cites research that pegs at about 400 days the average time a targeted virus remains undetected on a computer. And, he says, that doesn't speak highly of the current offerings from security vendors.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.