In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
Target Corp.'s revelation that personal information about up to 70 million customers was breached in a recent malware attack raises new questions about Target's security practices and risks to consumers.
The chairman of the Senate Judiciary Committee has introduced a national data breach notification bill for the fifth time, but its chances of passage remain slim.
In 2013, financial Trojans targeted more than 1,400 institutions in 88 countries - and these attacks are only growing. Symantec's Vikram Thakur tells how organizations can combat attackers in 2014.
Georgia Tech researchers are working on a way to profile devices along the supply chain to identify whether they've been compromised, says Paul Royal, associate director of the Georgia Tech Information Security Center.
Intel is changing the name of its McAfee line of security products to Intel Security. The name change follows the badmouthing of McAfee products by founder John McAfee, who sold his company to Intel in 2011.
We may never really know who or what is to blame for the Target breach that exposed as many as 40 million U.S. debit and credit cards, but there definitely is no shortage of theories from our readers.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
To help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014.
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.
Buried deep within a 308-page report from a presidential panel on ways to tighten federal surveillance and IT security programs are important recommendations on how to mitigate the insider threat at federal agencies.
2014 may well be the "Year of Security," and IT security pros must prepare now for new job demands. ISACA's Robert Stroud offers five New Year's resolutions to help prepare for 2014's security trends.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Target has confirmed that encrypted PINs associated with debit transactions conducted between Nov. 27 and Dec. 15 were compromised. But the retailer contends the risk to cardholders is low.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.