For risk managers, an often overlooked step for minimizing supply chain risks is to continually monitor outsourcers and other third parties to address critical security issues, says the Information Security Forum's Steve Durbin.
Google has agreed to a $17 million settlement with 37 states and the District of Columbia over its unauthorized placement of cookies on computers using Apple Safari Web browsers, which the states claim was a privacy violation.
Although businesses understand the benefits of sharing cyber-threat information with law enforcement, they often let perceived legal constraints prevent them from collaborating, says Mary Galligan, a former FBI investigator.
The breach of a card loyalty marketing company that exposed card data and other personally identifiable information illustrates the privacy vulnerabilities third parties pose, experts say.
Every second, 80 "things" are being connected to the Internet, and ISACA's Rob Stroud says that requires information security professionals to identify and mitigate threats, protect individuals' privacy and manage access.
NIST is revising its 3-year-old smart-grid guidance to address technological and policy changes that have made the power grid more susceptible to vulnerabilities and threatened utility customers' privacy.
A congressional committee grilled representatives from four technology vendors providing services for the Obamacare website, questioning, for example, whether the site is putting consumer privacy at risk.
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.
Mary Galligan, the just-retired head of the FBI's New York cyber unit, says the federal government can do more to help businesses take all the right steps to protect sensitive information and prevent breaches.
Nations' policies for mitigating cyberthreats can conflict with efforts to promote cyber-enabled global trade, cautions Allan Friedman, research director of the Brookings Institution's Center for Technology Innovation.
Twitter's IPO filing sheds light on the social media company's perceived security risks. For example, it acknowledges the challenge of preparing for evolving cyberthreats.
Individuals see information differently today than they did just a few years ago because of big data and that, in turn, influences how people perceive privacy. ISACA's Jeff Spivey explains.
With Congress back in Washington, lawmakers are focused on Syria, the federal budget and the debt limit. So cybersecurity is taking a backseat. Will that situation change soon?
The NSA, in a highly classified program code-named Bullrun, used supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine encryption, according to a news report.
International markets that have implemented EMV technology are seeing reductions in card fraud, but non-EMV markets are seeing dramatic upticks, says U.K.-based card fraud expert Neira Jones.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.