Organizations of all sizes continue to face ever-stricter regulatory and security requirements to protect their IT assets from unauthorized use. In response, many enterprises have embarked upon Identity and Access Management (IAM) initiatives, only to be disappointed with the cost, speed and effectiveness of their...
How does the role of IT security professionals need to change to improve the security of their organizations? Steve Durbin of the Information Security Forum offers insights.
Cloud computing for governments in the United States, especially services tailored for the federal government, may not be as efficient or as cheap as many would hope, says Richard Falkenrath, a principal with the security consultancy The Chertoff Group.
Securing the massive amounts of data swamping organizations, a trend known as big data, can be addressed, in part, by organizations simply getting rid of data no longer needed, Grant Thornton's Danny Miller says.
According to our new survey, more than half of banking institutions expect an increase in fraud-fighting resources this year. But how are they investing those resources? The answers may surprise you.
"Regulation drives spending," says George Tubin of GT Advisors. "You're in a situation where the regulators are telling you, 'You have to do something; you have to make improvements.' Therefore, the bank has to spend some money on technology."
Delaware Chief Security Officer Elayne Starkey offers her insight into the security challenges organizations face with two of IT's most popular trends: mobile device use and cloud computing.
The cost of a data breach is down, say the latest Ponemon Institute study. But as the Global Payments breach shows, organizations still have many reasons to be concerned, says researcher Larry Ponemon.
Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?
Performing a job effectively most of the time doesn't cut it in IT security, as the Internal Revenue Service is being reminded by Treasury Department auditors.
Complying with PCI requirements is now a normal part of doing business in today's interconnected world.
This white paper discusses how the PCI requirements apply to an IBM i server, and describes how PowerTech software can help you meet compliance guidelines.
You'll learn:
Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
"We are making significant progress in defining and rectifying the event," says Paul R. Garcia, CEO of Global Payments Inc., discussing the breach he says may have exposed 1.5 million payment cards.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.