In stepping up the fight against cyber crime, Michael Chertoff, Secretary of the US Department of Homeland Security (DHS), has a simple request: Send some of your best & brightest employees to help the government's efforts.
"We want your ideas, insights and I daresay your employees," Chertoff told the crowd in a...
Encryption is the method of encoding information using a password, in order to hide the real information from others. The technique is used for various tasks, including secure storage and transferring data between computers and wireless networks.
Storing information on computers is an everyday occurrence for most computer users, both at home and work. Solid state drives, external hard drives, online storage and file servers are some of the common devices used for storing valuable information. Read about each of these below for the common uses of each one.
If your company transfers, transmits or processes credit card data you fall under the Payment Card Industry Data Security Standard (PCI DSS). However although the PCI DSS was developed to protect credit card data, it is fast becoming a security standard for all sensitive company data such as patient records,...
As the compliance date set for June 30, 2007 has passed, thousands of companies have yet to show that they are in compliance with the Payment Card Industry Data Security Standards (PCI-DSS). The Payment Card Industry set that date for all organizations that store, process or transmit credit card payments were to be...
The revelation by TJX Companies, owner of T.J. Maxx and other retail brands, that at least 45.7 million credit and debit cards were compromised over several years highlights anew the risks associated with processing card transactions and the need to protect the information they contain.
Securing the network against intrusion is more than complying with the Federal Financial Institutions Examination Council’s mandate for strong authentication—although it’s certainly that. It also makes good business sense. Financial institutions that implement information security technology and...
The need to store and manage mushrooming quantities of unstructured content such as e-mails, instant messages, voice messages, and images is a major pain point for financial institutions of all sizes. An estimated 60 billion e-mails are sent across the globe each day and almost 80% of companies accept e-mail as...
The Gramm-Leach-Bliley Act (GLBA) contains a rule, known as the Safeguard Rule, under which the Federal Trade Commission and other federal agencies have established standards for financial institutions relating to administrative, technical, and physical safeguards for customer information. The objectives are to ensure...
EMC Corp.'s recent acquisition of RSA Inc. underscores the convergence of information security and storage. EMC, which sells large storage systems for use in corporate data centers, bought RSA - a manufacturer of encryption software and devices - to provide it with identity and access management technologies and...
Since January 1, at least 104 data incidents have been documented in the U.S., potentially affecting more than 56.2 million individuals. And that is probably just the tip of the iceberg.How many breaches don’t make the front page because the victimized company wants to avoid embarrassing publicity? We will...
By: Lila Buchalski, Editor, Bankinfosecurity.comSeptember 9, 2005 Today, if you Google the phrase, “email retention,†19.6 Million matches are found. If nothing else, that means that this topic is surrounded by industry buzz. With all of the complex regulations that only include vague policies on email...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.