The Latest News

  • ID Fraud Drops for First Time Since 2010

    But Javelin Says Mere 3% Decline Is Disappointing ID Fraud Drops for First Time Since 2010
    Al Pascual

    ID fraud reported by U.S. consumers dropped 3 percent in 2014 - the first decline since 2010, according to Javelin. But analyst Al Pascual says the decrease should have been much greater. Read more...

  • OCC Expands on Third-Party Cyber-Risks

    Director Offers Review of New Cyber-Resiliency Guidance OCC Expands on Third-Party Cyber-Risks

    Kevin Greenfield, director of bank IT for the Office of the Comptroller of the Currency, says FFIEC agencies are working to help financial institutions shore up cybersecurity, and a big focus for regulators is third-party risks. Read more...

  • Fed, State Regulators: Reform Is Needed

    OCC, NY DFS Call for Better Standards, Info Sharing Fed, State Regulators: Reform Is Needed
    Thomas Curry and Benjamin Lawsky

    Banking institutions' technical and procedural shortcomings pose increasing risks to the nation's critical infrastructure, two banking regulators note. Learn why they say more transaction monitoring and information sharing are needed. Read more...

  • Apple Pay: Authentication a Soft Spot

    Mobile a Breeding Ground for Counterfeit Card Fraud Apple Pay: Authentication a Soft Spot

    New exploits linked to Apple Pay aren't compromising the mobile device's security, but instead are taking advantage of lax authentication practices used by banking institutions to verify cards that are loaded to the iPhone for Apple Pay purchases. Read more...

  • What is Gov't Role in Info Sharing?

    Researcher Says Private Sector Input Will Hinge on Trust What is Gov't Role in Info Sharing?
    Lance James

    This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James. Read more...

  • Article

    Alternative Info-Sharing Bill Unveiled

    Measure Includes Liability, Privacy Provisions Businesses Seek By Eric Chabrow
    Alternative Info-Sharing Bill Unveiled

    The Senate Intelligence Committee could consider in the coming days new cyberthreat information sharing legislation that's seen as more to the liking of the business community than the measure proposed by President Obama.

  • Article

    'Freak' Flaw Also Affects Windows

    Microsoft Sounds SSL/TLS Alert, Joining Apple, Google By Mathew J. Schwartz
    'Freak' Flaw Also Affects Windows

    All Windows operating systems are at risk from the SSL/TLS vulnerability known as Freak, Microsoft warns. The company has outlined temporary workarounds - except for Windows Server 2003. Experts say no in-the-wild attacks have yet been seen.

  • Blog

    Readers: Merchant Security Too Lax

    Retailers' Reluctance to Adopt EMV Gets Negative Reactions By Tracy Kitten
    Readers: Merchant Security Too Lax

    A recent blog about payments security generated a spirited debate about the current state of merchant security, why card breaches continue to be an issue and EMV's impact on fraud.

  • Blog

    Clinton's Email Brouhaha and Politics

    Coverage Focus Segues from Secrecy to Security By Eric Chabrow
    Clinton's Email Brouhaha and Politics

    Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.

  • Article

    Could Costs Impede Info-Sharing Plan?

    Scrutinizing Obama's Cyberthreat Information Sharing Strategy By Eric Chabrow
    Could Costs Impede Info-Sharing Plan?

    Small and mid-size businesses might not be able to afford participating in voluntary programs to share and receive cyberthreat information, as President Obama has proposed, industry representatives tell Congress.

More news...

Webinars

More webinars...

White Papers

  • Addressing the Cyber Kill Chain - Are you prepared?

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these...

  • HP Cyber Risk Report 2015: Executive Summary

    The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers...

More whitepapers...
ARTICLE Goodwill Names Vendor in Breach

Goodwill Industries International has confirmed the third-party vendor that was compromised in a...

Latest Tweets and Mentions

ARTICLE Goodwill Names Vendor in Breach

Goodwill Industries International has confirmed the third-party vendor that was compromised in a...

The ISMG Network