The Latest News

  • PCI DSS Version 3.1 - What's New?

    Troy Leach of PCI Council Explains New Version of Standard PCI DSS Version 3.1 - What's New?
    Troy Leach, PCI Security Standards Council

    The PCI Council has just released PCI DSS 3.1, which calls for mothballing the SSL encryption protocol. What do security leaders need to know about the revised standard? Troy Leach of the council offers insights. Read more...

  • Mobile Payments: Apple Pay vs. Rivals

    ABA's Kenneally on Security Risks of New Payments Options Mobile Payments: Apple Pay vs. Rivals
    Steve Kenneally

    Fraud risks associated with Apple Pay have raised new worries about mobile payments, says Steve Kenneally of the American Bankers Association. During the ABA's Risk Management Forum April 15-17, experts compared three mobile solutions. Read more...

  • Target, MasterCard Settle Over Breach

    Retailer Offers Issuers a Total of Up to $19 Million Target, MasterCard Settle Over Breach

    Target has agreed to pay a total of up to $19 million to issuers of MasterCard payment cards over losses and expenses they incurred as a result of the retailer's massive 2013 data breach. Read more...

  • PCI DSS Updated to Address SSL Risk

    Security Standards Council Urges Use of Current TLS Protocol PCI DSS Updated to Address SSL Risk

    The PCI Security Standards Council has published a new version of its data security standard that calls for ending the use of the outdated Secure Sockets Layer encryption protocol that can put payment data at risk. Read more...

  • Banks' Vendor Monitoring Comes Up Short

    New York State Regulator Considering More Scrutiny Banks' Vendor Monitoring Comes Up Short

    Banks are not doing enough to ensure that third-party service providers are taking adequate cybersecurity steps, according to the New York State Department of Financial Services, which is considering ramping up regulatory scrutiny. Read more...

  • Blog

    Hot Sessions at RSA 2015

    Threat Intelligence, Crypto Among Topics at Must-See Sessions By Mathew Schwartz
    Hot Sessions at RSA 2015

    Everything from playing cybersecurity offense to the limits of cryptography in the post-Snowden era are on the agenda for this year's RSA Conference. Here's our rundown of must-see events.

  • Blog

    Info-Sharing Bills: What Happens Next?

    Obama's Stand on Two Measures Could Affect Their Fate By Eric Chabrow
    Info-Sharing Bills: What Happens Next?

    As the House prepares to vote this week on two cyberthreat information sharing bills, their fates will rest as much on the White House's reaction to the proposals as on what happens in Congress.

  • Interview

    Information Sharing: A Matter of Trust

    FS-ISAC's Nelson Offers a Progress Report By Tracy Kitten
    Information Sharing: A Matter of Trust

    Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.

  • Interview

    Framework for a New ID Ecosystem

    Draft of Model to Be Previewed at RSA Conference 2015 By Tom Field
    Framework for a New ID Ecosystem

    What is the Identity Ecosystem Framework, and why is it so important for security professionals to embrace? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.

  • Article

    National Breach Notice Bill Advances

    Measure Would Pre-empt State Breach Notification Laws By Eric Chabrow
    National Breach Notice Bill Advances

    A House committee approved on April 15 a national data breach notification bill, but the committee chairman concedes that the legislation isn't quite ready for a vote by the full House of Representatives.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Could Costs Impede Info-Sharing Plan?

Small and mid-size businesses might not be able to afford participating in voluntary programs to...

Latest Tweets and Mentions

ARTICLE Could Costs Impede Info-Sharing Plan?

Small and mid-size businesses might not be able to afford participating in voluntary programs to...

The ISMG Network