While the U.S. migration toward EMV card technology may have been jolted by a July court ruling, Randy Vanderhoof of the Smart Card Alliance contends the movement toward EMV will accelerate in 2014.
A pilot project that Pennsylvania is launching to develop single identities for residents could help reduce fraud while piggybacking on existing enterprise directory services
Jeh Johnson, the new secretary of Homeland Security, is expected to become one of the top advocates of the administration's cybersecurity policy as the White House shifts more IT security responsibilities to DHS.
Most fraud on the Internet is linked to unsecured identities, which is why a new global identification framework is needed, says Paul Simmonds, who heads a coalition working on a framework model.
Cybersecurity risks posed by inadequate IAM and IT asset management are mounting. Now the National Cybersecurity Center of Excellence has drafted guidance to address banking institutions' unique risks, says Nate Lesser, the center's deputy director.
The final version of the FFIEC's guidance on social media use clarifies how banks should assess consumer and third-party risks. But suggested controls for employee risks are still missing.
A Senate committee will soon consider a patent reform measure that is less aggressive than a recently approved House bill designed to help stem the tide of patent infringement lawsuits that sometimes target security technologies.
NSA Director Gen. Keith Alexander says the agency has taken 41 actions to prevent leaks by insiders in the wake of disclosures of classified documents about the agency's surveillance programs by former agency contractor Edward Snowden.
Receiving a notification letter about a data breach brings home the reality of just how common these incidents are - and how much prevention work, including encryption, still needs to be done.
The NIST cybersecurity framework will help U.S. banking institutions assess their security strategies, but some institutions fear the framework could trigger unnecessary regulations, says Bill Stewart of Booz Allen Hamilton.
Hackers have pilfered some 2 million user passwords and credentials for Facebook and other social media and Internet sites, according to IT security provider Trustwave. The hackers attacked computers in about 100 nations.
Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
A new takeover scam that the FBI calls a "man-in-the-e-mail" attack has drained $1.65 million from three Seattle-area businesses' accounts. Learn what steps to take to avoid becoming the next victim.
Can the two most feared nations in cyberspace finally come to an agreement to stop hacking each other and stealing confidential data? Here's one peace-making approach worthy of consideration.
Obama administration officials say hundreds of technical issues have been ironed out of the federal HealthCare.gov site, but have all of the security concerns been adequately addressed and tested?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.