The emergence of contactless chip payments on mobile phones is changing the way transactions are authenticated and secured, Jeremy King of the PCI Security Standards Council explains in this audio interview.
Yahoo has the dubious distinction of having not just one but two record-shattering historical breaches come to light this year. The latest breach to be revealed, which dates back to 2013, involved the potential compromise of 1 billion accounts.
Over the years, HHS has released several guidance documents, but all are weak and without mandates as it relates to identity management and authentication of entities accessing protected health information. Guidance typically includes words like "may" and "should," but rarely include words like "shall" or "must."
Hack attack victims often ask two questions: "Who did it? And can we hack them back?" But after an attack, with time of the essence for blocking further damage, those are the wrong questions for breached organizations to be asking, data breach response expert Alan Brill says in this audio interview.
How much time and effort will consumers put into protecting themselves from identity theft and financial fraud? That was the question posed by Aite Group's Julie Conroy in researching the new Global Security Engagement Scorecard. And the answer might just surprise you.
In the latest sign that when it comes to data, absolutely nothing is sacred, hackers have set their sights on fans of Kentucky Fried Chicken, and in particular 1.2 million members of its Colonel's Club loyalty program in the U.K. and Ireland.
Following the government's recent demonetisation initiative, the RBI has announced removal of its two-factor authentication requirement for low-value card-not-present transactions. But some critics fear the move, designed as a catalyst for cashless transactions, could lead to an increase in fraud.
Hours after President Obama directed intelligence agencies to conduct a full review of alleged efforts by the Russians to influence the 2016 presidential election, reports surfaced that the CIA in a secret report concluded with "high confidence" that the Kremlin tried to influence the vote in favor of Donald Trump.
Over the past two years, DDoS attacks have grown in strength and in purpose - they are often used now as a tool of extortion, says Richard Meeus of security vendor NSFOCUS. How should security leaders prepare to respond to these strikes?
In an in-depth audio interview, Troy Leach of the PCI Security Standards Council describes just-released guidance that's designed to help organizations simplify network segmentation, a practice the council strongly recommends to help protect payment card data.
Coming soon to an internet service provider near you: routers infected by IoT device botnet-building malware such as Mirai. The latest victim is ISP TalkTalk, which is updating routers to block DDoS attackers who have been seizing control of the devices.
In an audio interview, Steve Durbin, managing director of the Information Security Forum, offers a forecast of the top security threats for the year ahead, including the ramping up of attacks fueled by "crime-as-a-service" offerings.
As fraudsters continually refine their techniques to steal banking customers' credentials, IBM fights back with new tools that use behavioral biometrics and cognitive fraud detection. IBM's Brooke Satti Charles offers a preview.