It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
The certificate authority system is flawed. It's like the Wild West, disjointed and unregulated, where no enforcement exists for standardized accountability.
Hacks are unavoidable; they happen. The challenge is how to handle them once they occur. DigiNotar demonstrates what organizations should not do when a breach is discovered.
It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
Provisions in legislation introduced by Sen. Richard Blumenthal, D-Conn., target companies that store online data for more than 10,000 people to assure their customers' personally identifiable information is protected.
Although those in the field understand very well that the CFPB will have an enormous impact on privacy policy-making responsibilities, questions remain about what the agency will actually do.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
Facial recognition technology could prove to be an effective way to authenticate individuals seeking entry to secured buildings or databases storing sensitive information. But the biometric technology already is being abused, and IT security managers employing facial recognition should be careful to encrypt the...
The bright spot is that 36 percent of the takeover incidents reported in 2010 were stopped before fraudulent funds transfers were approved. That's an improvement from 2009, when only 20 percent were thwarted.
As social media continues to evolve and new threats continue to emerge, organizations must constantly re-evaluate their policies and conduct risk assessments, says Andrew Kennedy, who heads up social media policy for BITS.
When it comes to banning the use of social media in the workplace, Jenny Corotis Barnes, assistant general counsel at Ohio State University Medical Center, has a strong opinion: Forget about it.
International collaboration, steeper convictions for those who are caught and government support for the cyberfight are fueling positive progress in the fight against cybercrime.
Trust has been a murky trait on the Internet since its inception. Remember the New Yorker cartoon? A dog, sitting by a PC, says: "On the Internet, nobody knows you're a dog." It's hard to trust what you see on the Net. That's more true today than ever.
Tokenization is a rising data security model that is gaining traction with CISOs for reducing risk and complying with industry data security mandates and privacy laws in extended heterogeneous IT environments.
This presentation will introduce tokenization to IT and Security professionals using some practical,...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.