The financial system is in better shape than what it was in 2008 and 2009. But market volatility and regulatory reform could change everything, says former FDIC head William Isaac.
"Once you identify that person based on the unique characteristics of their face, you could then match it with other databases," privacy advocate Beth Givens says, referring to privacy gaps created by facial recognition technology.
Payments are moving away from tangible currency to so-called new economies, where value relies more on reputation than currency. Venues such as Facebook facilitate e-commerce via new economies. But as with any change in the payments scheme, industry experts expect these new economies to be accompanied by new risks.
"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
In an exclusive interview about the evolving firewall, Keil discusses:
Why current firewalls are failing us?
The key...
Software applications are the lifeblood of every organization, and today's #1 IT security threat is vulnerabilities in these applications. Complexity, interconnection and criticality of source code have resulted in a dangerous proliferation of vulnerabilities and risks.
Register for this session to learn:
How...
Layered security is one of the core tenets of the new FFIEC Authentication Guidance - and it's perhaps the most effective strategy for detecting and preventing banking fraud schemes. But what are some of today's most mature approaches to layered security, and how are banking institutions employing them to detect and...
Ohio is relatively new to enterprise information security, and according to David Shaw, the state's chief information security officer, there is still much to do to ensure that all the agencies' critical infrastructure is protected.
Out with the old; in with the new. It's time for security-minded organizations to invest in the power and protection of the next generation firewall, says Matt Keil of Palo Alto Networks.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
What is the budgetary impact of IT assets on our agencies' operations? How can we control costs as we continue to bring on new technology? Are we responding to service issues as quickly as our units need? As agencies continue to deal with IT infrastructure growth, they must also deal with an equally increasing need to...
Visa's introduction of chip-based payments incentives for U.S. merchants is enhancing dynamic authentication and expects to accelerate adoption of the EMV standard.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.