The federal government is licensing a government-built anomaly detection tool known as PathScan to Ernst & Young, which, in turn, will refine the software and market it. In an interview, DHS's Mike Pozmantier explains why the government is offering its technology to the private sector.
Blue Coat CTO Dr. Hugh Thompson speaks about the future of security, the constants that need attention, and lessons to be learned from the U.S. when it comes to writing meaningful breach notification laws.
An inspector general's memo that highlights three significant information security deficiencies that have plagued the U.S. Department of Labor for the past five years points out problems that most federal agencies confront.
Relationships with vendors are vital for many organizations, but the more data you share, the more risk you acquire. And mitigating this risk requires a degree of visibility into vendor systems that most organizations are hard-pressed to achieve.
Download this guide to explore:
Five of the most impactful...
There is no denying that the attack methods for stealing your organization's data are continuing to expand with third party vendors - which is the most invisible risk in your partner and supplier ecosystem.
Regulators in many industries, including financial services and healthcare, are tightening their grip on...
Banks are not doing enough to ensure that third-party service providers are taking adequate cybersecurity steps, according to the New York State Department of Financial Services, which is considering ramping up regulatory scrutiny.
New NIST guidance is aimed at helping organizations to better understand the risks associated with the information and communications technology supply chain, says Jon Boyens, a NIST senior adviser.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled? BitSight's Stephen Boyer offers insight.
As cyber attacks via third parties become more commonplace, IT decision makers have focused much of their energy on the cyber security of their vendors. It can be a challenge to manage so many different partnerships. Due to the desire for more data-driven decisions, those IT professionals are looking for an automated...
Retailers cannot avoid innovation. Yet, cybercriminals thrive when retailers innovate. What, then, can retailers do to stop cybercriminals from breaching their defenses? Here are three key questions to answer.
The point-of-sale vendor behind the Jimmy John's breach has stepped forward, saying that, along with the 216 impacted Jimmy John's eateries, an additional 108 different restaurants have been compromised.
As a customer, Delaware Chief Security Officer Elayne Starkey has seen the evolution of cloud computing over the past three years to a point where she has more sway over the security terms of cloud services contracts.
Federal authorities say the successful prosecution of a member of an international cybercrime ring proves progress is being made in shuttering ATM cash-out schemes. But some experts say processors and prepaid cards will continue to be targeted by attackers.
The OCC says cyberthreats against the U.S. financial infrastructure are growing, and financial fraud should not necessarily be banking institutions' top concern. Learn more about the latest OCC report.
With many organizations pushing outsourcing to its limits, regulators and standards bodies (e.g., MAS, OCC, BaFin, FCA, FedRAMP, BITS, NERC, NEI, ISO, PCI Security Council, AICPA, and Cloud Security Alliance) are increasingly putting an emphasis on having a strong and effective supplier risk management framework....
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.