Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Accelerated interest in mobile payments is paving the way for new revenue streams. But Javelin's Alphonse Pascual says mobile security products, not payments technology, will reap the most rewards for banks.
The future of security in payments remains unclear, says Nicolas Vedrenne of the Merchant Risk Council. But international collaboration will be critical, especially as infrastructures merge.
Third-party applications and users' risky behavior are two of mobile security's greatest enemies. But mobility expert Tom Wills says banking institutions can mitigate their risks. Here is how.
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
On the same day Citi's online and mobile-banking channels went down for undisclosed reasons, Homeland Security Secretary Janet Napolitano said top U.S. banks are "actively under attack."
NIST has issued a draft of guidance that defines the fundamental security components and capabilities needed to help mitigate the risks involved in using the latest generation of mobile devices.
As more consumers turn to mobile banking, financial institutions face increasing pressure to ensure security, says SWACHA's Dennis Simmons. Find out his mobile security recommendations.
With the release of the iPhone 5, and other new mobile devices and upgrades on the way, how should security leaders prepare their organizations for 2013? Intel CISO Malcolm Harkins offers guidance.
The FBI has alerted consumers about two Trojans that have compromised mobile devices running the Android operating system. But are all mobile devices at risk?
TD Bank's October breach notification about two backup tapes lost in March is difficult to justify, legal experts say. As a result, the bank could face lawsuits, as well as state fines.
Windows 8 is coming and includes security upgrades. How should security and technology leaders approach Microsoft's updated operating system? Forrester analyst Chenxi Wang offers recommendations.
The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
As mobile computing becomes ever-present, enterprises face a new threat landscape that includes rogue marketplaces, insecure public Wi-Fi and proximity-based hacking, says Dan Hubbard of the Cloud Security Alliance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.