A new set of patent infringement suits is targeting payment card networks, payment processors and e-commerce sites. Meanwhile, the American Bankers Association has endorsed pending federal legislation designed to help curb these legal actions.
Top Obama administration IT leaders testified to a Congressional committee Nov. 13 about the technical woes of the HealthCare.gov website. Learn what they had to say about important security issues.
An auditor's investigation into a breach at Minnesota's health insurance exchange before it opened for consumers pinpoints several mistakes. The auditor also urges other exchanges to ramp up security.
Do you know how many government agencies or, for that matter, critical infrastructure operations that have been attacked online? Neither does Congress. But some senators have introduced legislation to find out.
In mitigating insider threats, technology should be used in conjunction with information sharing and risk-prevention business practices, says Jason Clark, a researcher at Carnegie Mellon University.
New payment card security standards issued by the PCI Council include a number of improvements, plus some glaring omissions, such as requirements for mobile, security experts say. What are their chief concerns?
Organizations must guard against making three common mistakes when conducting an investigation of a data breach or fraud incident, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
The number of reported breaches is up considerably this year, but so is the overall quality of organizations' breach preparedness, says Michael Bruemmer of Experian Data Breach Resolution.
Tony Trenkle is stepping down as CIO at the Centers for Medicare and Medicaid Services as the troubled HealthCare.gov website for Obamacare continues to undergo major technical fixes.
The National Institute of Standards and Technology continues to collaborate with the National Security Agency on its IT security guidance even as it investigates whether the spy agency meddled with one of its special publications.
The FBI has announced the addition of five individuals to its Cyber's Most Wanted list for crimes that include hacking, fraud, identity theft and the use of malicious software.
A significant uptick in traffic linked to an Internet port known as "port zero" is likely among the first signs of a massive and targeted attack against remote servers and networks worldwide, one threat researcher says.
As major cloud vendors, including Salesforce, integrate identity and access management features into their platforms, security professionals must size up the role that stand-alone IAM systems will play in the long run.
NIST is revising its 3-year-old smart-grid guidance to address technological and policy changes that have made the power grid more susceptible to vulnerabilities and threatened utility customers' privacy.
What are the distinct phases of the fraud lifecycle, and how can banking institutions intervene at each stage to prevent losses? Daniel Ingevaldson of Easy Solutions offers fraud-fighting tips.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.