Security experts say the new alliance between IBM and Apple could lead to broader use of iPhones and iPads at banking institutions if the partnering companies demonstrate adequate security and scalability.
Mobile banking brings new opportunities to institutions and customers alike - but also a host of new security risks. Jim Anderson of BAE Systems Applied Intelligence discusses the emerging landscape.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
Does cheap labor allow Chinese hackers to troll one website after another until they find something of interest? Times could prove tough for hackers trying to make an 'honest' day's wage.
Recent high-profile retail breaches could help increase interest in the adoption of mobile payments to lessen the likeliness of fraud at the point of sale, says Aite Group analyst Thad Peterson.
Mobile banking brings new opportunities to institutions and customers alike - but also a host of new security risks. Jim Anderson of BAE Systems Applied Intelligence discusses the emerging landscape.
From Neiman Marcus to P.F. Chang's, 2014 has shaped up to be the 'Year of the Data Breach.' What lessons can be gleaned from the trenches of breach investigation? Experian's Michael Bruemmer shares tips.
The "Energetic Bear," a.k.a. "Dragonfly," hacking campaign targets U.S. and Western European energy firms. While the hackers appear to be backed by Russia, the purpose of their attacks remains unclear.
Could too much regulatory oversight hinder cyberthreat information sharing, rather than encourage it? That's an increasing concern for bankers, who argue regulators could bog down progress in cybersecurity.
Does BYOD really stand for Bring Your Own Disaster? JD Sherry of Trend Micro discusses the latest mobile security trends and threats, including the evolution of ransomware and the Internet of Things.
Users' fear of data loss on personal devices must be balanced with an organization's need to protect sensitive information, says ZixCorp's Nigel Johnson. He explains the evolution of mobile device management.
Thefts of iPhones in New York, San Francisco and London declined after Apple added a remote-disabling feature. Now Google and Microsoft have promised to offer the feature in their mobile operating systems.
If the NSA's meddling in NIST cryptography standards soiled the reputation of the National Institute of Standards and Technology, an amendment approved by the House of Representatives could help restore it.
Kentucky is now the 47th state to enact a breach notification law. While a national law superseding the widely varying state statutes is long overdue, the primary election defeat of House Majority Leader Eric Cantor makes passing such a bill tougher.
Consumer rights advocates have applauded Apple's preview of iOS 8 privacy changes, including randomizing MAC addresses to help block retail analytics and unauthorized forms of device tracking.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.