"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
The FBI says Bulgarian fraudster Dimitar Dimitrov led ATM skimming rings that ranged from New York to Las Vegas, and now a federal judge has sentenced him to prison. Is the sentence appropriate?
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
Federal Communications Commission Chairman Julius Genachowski wants Internet service providers to take voluntary, concrete steps to battle a trifecta of cyberthreats: botnets, Internet route hijacking and domain-name fraud.
The National Institute of Standards and Technology is establishing the National Cybersecurity Center of Excellence, a public-private collaboration aimed at accelerating the widespread adoption of integrated cybersecurity tools and technologies.
A CEO's experience dealing with the aftermath of an information breach caused by the theft of an unencrypted laptop offers valuable lessons. Read about his real-world advice.
"The role of expert witness will only become more critical as our dependency on electronic data increases," says Eric Cole, who offers tips on how to pursue these opportunities.
Sens. Joseph Lieberman and John McCain, often legislative allies, spar over provisions of a major cybersecurity bill that McCain contends unduly burdens business with regulations and that Democratic leaders want to rush to enact.
One of the most important ways to prevent breaches is to make widespread use of encryption, especially for mobile devices and media, says security expert Melodi Mosley Gates. Here are few practical tips for leaders.
Going to RSA Conference? Don't miss ISMG's presentations on cloud security and the faces of fraud. Also, ISMG editors will host a meet & greet reception on Tuesday at the event. Click for details.
RSA Conference 2012 opens Feb. 27 in San Francisco, and for the third straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda at this world-class security event?
President Obama's proposed fiscal 2013 budget would cut by 5 percent the budget for the Department of Health and Human Services' Office for Civil Rights, which enforces HIPAA.
What are today's key hiring factors? What are the top skills needed from information security professionals in 2012? See the results of a new Career Impact Survey just released by (ISC)2.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.