Guidance on how organizations should protect the confidentiality of personal identifiable information, SP 800-122: Guide to Protecting the Confidentiality of Personally Identifiable Information, or PII, has been issued by the National Institute of Standards and Technology.
"While the question of how best to balance privacy and security in the 21st century has no simple answer, what is clear is that our federal electronic privacy laws are woefully outdated," Sen. Patrick Leahy says.
Interview with Adrian Davis of the Information Security Forum
In terms of payments, privacy and third-party relationships, U.S. security leaders have much to learn from - and share with - their peers in the U.K. and elsewhere in the world.
This is the perspective of Adrian Davis, a senior research consultant...
We've emerged from a global financial crisis, and now regulatory reform is coming to financial services.
What do these events mean for the financial regulatory agencies - especially in terms of securing access to sensitive data?
John Bordwine, Public Sector CTO at Symantec, tackles this question,...
We've emerged from a global financial crisis, and now regulatory reform is coming to financial services.
What do these events mean for the financial regulatory agencies - especially in terms of securing access to sensitive data?
John Bordwine, Public Sector CTO at Symantec, tackles this question, discussing:
...
Ghosts of Crimes Past and Present Will Haunt the Future of Banking Institutions and Customers
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were hit from every angle with...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
The Federal Trade Commission announced on Monday that is has notified nearly 100 organizations that their peer-to-peer (P2P) file-sharing networks have been sharing information with the wrong people.
Joy Pritts, J.D., has been named the first chief privacy officer within the Office of the National Coordinator for Health Information Technology. ONC is a unit within the U.S. Department of Health and Human Services that is carrying out the provisions of the HITECH Act, including beefed up information security...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
"In an interconnected world, an attack on one nation's networks can be an attack on all," Secretary of State Hillary Clinton said in a major foreign policy address on Internet freedom.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.