Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
Ground was broken on the Utah Data Center, a $1.2 billion, 1 million-square-foot cybersecurity center being built for the National Security Agency at Camp Williams near Salt Lake City.
Incidents such as the WikiLeaks disclosures and resulting fallout push leaders to redefine their data protection agenda for 2011 and think about their organizations' vulnerabilities.
Delaware has implemented filters that block unencrypted messages containing the numeric pattern of Social Security numbers: three digits, two digits, four digits, state Chief Security Office Elayne Starkey says.
Federal agencies have until Jan. 28 to complete an assessment on how they handle confidential information, a process prompted by the WikiLeaks episode that exposed 250,000-plus diplomatic cables in November, says OMB Director Jacob Lew.
The General Services Administration needs to strengthen its IT security program in four key areas, the GSA inspector general says in its latest information security audit.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.