Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
Federal employees practice good IT security hygiene, especially when they're in the office; less so when they work remotely, possibly because IT security measure are seen hindering productivity.
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
Understanding the contact versus contactless variables for an implementation of EMV in U.S. is the first step, says Smart Card Alliance's executive director.
Unfettered access to state data "is the kind of stuff that causes me to lose sleep at night," Delaware CSO Elayne Starkey says, in explaining new, stringent rules to let employees use their own smart phones to access state networks.
"Where mobile payments are concerned, I don't want to say banks will be taken to the cleaners, but I think that's where their biggest threat is," says Avivah Litan of Gartner.
When Southwest Washington Medical Center in Vancouver, Wash., introduced free wireless Internet access for patients and guests, it used a "defense-in-depth" strategy to address security issues, says Christopher Paidhrin, IT security compliance officer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.