Michaels Stores Inc. says POS PIN pads at nearly 90 stores in 20 states were tampered with, exposing debit and credit cardholders to fraud. Now the chain says it is replacing PIN pads at the majority of its 964 U.S. stores.
The legislative blueprint for comprehensive cybersecurity legislation would strike a critical balance between strengthening security, preserving privacy and civil liberties protection and fostering continued economic growth, an official says.
Five Democratic senators point to inconsistencies in corporate Security and Exchange Commission reporting, investor confusion and the national importance of addressing cybersecurity for the need of new guidance.
Plan would nationalize breach notification law, set penalties for cybercrimes and protect businesses from lawsuits that share cybersecurity information with DHS as well as promote the use of cloud computing.
BITS and the ABA are interested in managing future domains affiliated with bank brands and financial interests. If approved, their domain oversight would allow them to control certain domain names registrations.
When it comes to hot topics, they don't get hotter than authentication, cloud computing and IT governance - all of which I've discussed at length in recent interviews with industry thought-leaders. Let's review some highlights from these conversations.
Globally, countries and organizations now recognize the need for a unified approach for managing IT infrastructure services, says Marlin Pohlman of the Cloud Security Alliance. The trick is developing this new set of global standards.
In the wake of recent data breaches, industry experts fear that consumers and employees alike will start exhibiting signs of "breach fatigue" and treat such incidents apathetically. Here are tips for how to ward off apathy.
"No one up here wants to stop Apple or Google from doing the incredible things that you do," Sen. Al Franken says. "What today is about is trying to find a balance between all of those wonderful benefits and the public's right to privacy."
ThreatMetrix's Taussig says device identification must be part of layered security measures. Banking regulators want financial institutions to deploy multiple layers of online security. But what does that expectation mean when it comes to investments in fraud detection?