At a time of heightened cybersecurity threats, few organizations have processes for employees at all levels to report breaches. It's time for accelerated breach response, says attorney Ellen Giblin.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Frustration over the growing number of retail breaches is heating up. See what our readers had to say after the malware attack that hit MAPCO Express, and why they believe PCI compliance isn't enough to ensure security.
Another retail malware attack, this time against the upscale restaurant chain Roy's, proves hackers are honing their tactics, experts say. But investigations are thwarting compromises sooner.
Preliminary results of the 2013 Faces of Fraud Survey show institutions are still suffering big financial losses linked to ACH and wire fraud. Why are they still getting hit, in spite of investments to detect and prevent account takeover?
Former White House privacy counselor Peter Swire says the time is right to re-evaluate the checks and balances surrounding government programs that collect data on American citizens.
It's been two years since the FFIEC issued updated guidance for online-banking transactions. But how effective have banks' conformance strategies actually been at curbing fraud? Experts weigh in.
Janet Napolitano's departure as homeland security secretary could have an adverse impact on the nation's cybersecurity policy, at least temporarily, considering the posts of deputy secretary and deputy undersecretary for cybersecurity remain vacant.
Securing mobile devices in the enterprise is just half the challenge. The other is ensuring that employees are able to work productively. A panel of experts from Attachmate offers new strategies.
A new incident response publication coming from the National Institute of Standards and Technology will include guidance on how to form circles of trust - networks of IT security experts spanning multiple organizations, says NIST's Lee Badger.
What are the costs involved with defending against the insider threat? Randy Trzeciak and George Silowash of Carnegie Mellon University's CERT Insider Threat Center offer insights.
Addressing cyber-attacks is not just a technology issue. It requires a holistic view from the entire organization, says ISACA's Jeff Spivey, who emphasizes the need for a framework approach to security.
Losses linked to retail breaches have fueled class action lawsuits on behalf of consumers. But Javelin's Al Pascual says banks are soon likely to take legal action, too, in breach cases that expose cards and lead to fraud.
Electronic banking fraud is as rampant as ever because of the failure to address one of the core problems, says security specialist Tom Wills, who describes why focusing only on technology to defeat Trojans will never work.
Our analysis of U.S. government labor statistics shows a sizable increase in the IT security workforce. But the way the occupation is defined may have as much to do with the increase as the number of jobs themselves.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.