A multi-layered approach known as "context-aware security" is the most effective strategy for fighting both insider and external cyberthreats, says Gartner analyst Avivah Litan, who explains how this strategy works.
Consumers around the world aren't overly concerned about Internet security, perhaps because they've experienced fatigue from the oversaturated media coverage of data breaches, Unisys Chief Information Security Officer David Frymier says.
The National Institute of Standards and Technology is developing new cybersecurity standards based on the same principles engineers use to build bridges and jetliners.
Internet users in the European Union can ask Google and other search engines to remove certain sensitive information from Internet search results, Europe's highest court ruled on May 13. ENISA praised the "landmark decision" on privacy.
Marc West of Fiserv says banking institutions have two challenges when it comes to developing mobile-payments solutions - focusing on the product development and preparing for regulatory oversight.
As mobile banking adoption rapidly grows this year, financial institutions need to identify and fill security gaps, says Aite Group analyst Julie Conroy, a featured speaker at the May 14 Fraud Summit Chicago.
Embedding some information security practitioners within business units could help improve IT security awareness in many enterprises, reducing security risk, says Steve Durbin, global vice president of the Information Security Forum.
Conventional wisdom dictates that the high demand for IT security practitioner would cause salaries to rise, perhaps significantly. But a new study by SANS shows only a slight fattening of paychecks for many IT security professionals.
Community banking leaders should be preparing for more stringent oversight of cybersecurity awareness and initiatives in their upcoming FFIEC assessments, according to industry experts, including Doug Johnson of the American Bankers Association.
To address new features and new threats, the National Institute of Standards and Technology has revised its guidance for transport layer protocol. Learn about the recommendations for protecting data during transmission.
Today's cybercriminals are perfecting the use of advanced-persistent-threat attacks to pilfer valuable information from precisely targeted victims, says Greg Day of security provider FireEye.
Third-party risks and the Fed's plans for emerging payments will be highlighted at ISMG's Fraud Summit Chicago on May 14. How banking institutions and retailers are expected to respond to new risks posed by external parties will be a focus for our keynote panel.
The FFIEC is planning cybersecurity vulnerability and risk-mitigation assessments to help smaller banking institutions address potential gaps. The assessments are expected to begin later this year.
Card breaches at retailers such as Target and Neiman Marcus will likely be catalysts for improved cyberthreat intelligence and information sharing across the banking and retail sectors, says Mike Braatz of ACI.
"Security as a business enabler" was the mantra echoing through the recently concluded 2014 Infosecurity Europe conference in London, a message that should have been heeded by top executives at retailer Target last year.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.