The European Central Bank (ECB) Recommendations For The Security Of Internet Payments sets forth numerous recommendations for European banks to enhance online fraud prevention practices. The ECB recommendations are more expansive and detailed, yet fundamentally similar to the US Federal Financial Institutions...
News headlines about the increasing frequency of stolen information and identity theft have focused awareness on data security breaches - and their consequences. In response to this issue, regulations have been enacted around the world. Although the specifics of the regulations may differ, failure to ensure compliance...
Given the potentially disastrous consequences of a breach, it is important for IT and security leaders to be aware that there are simple and extremely cost efficient steps that any organization can take immediately to improve protection and reduce risks.
How can your organization reduce risk by taking a proactive...
Data security presents a multidimensional challenge in today's complex IT environment. Multiple access paths and permission levels have resulted in a broad array of security threats and vulnerabilities. Traditional "fortress approaches" such as firewalls and IDS/IPS systems are no longer sufficient to defend against...
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and...
Organizations are eager to harness the power of big data. But as new big data opportunities emerge, ensuring the veracity and security of source information becomes
exponentially more difficult. If these challenges are not addressed directly, end users will lose confidence in the insights generated from big data. As...
Historically, Apache Hadoop has provided limited security capabilities, and most Hadoop implementations to date have been deployed with little thought given to security. To protect sensitive data being stored and analyzed in Hadoop, security architects should use a structured approach to security.
A breach of an U.S. Office of Personnel Management system used to conduct security clearance background checks exposed the personal information of 21.5 million individuals, the agency announced July 9.
FBI Director James Comey says the White House plans to confirm that the U.S. Office of Personnel Management data breach exposed "millions and millions" of background-check records. Meanwhile, a second union has now sued OPM over the breach.
Is it wrong that accused Lizard Squad hacker Julius Kivimaki, a teenager who was convicted of 50,700 "instances of aggravated computer break-ins" attacks, gets to walk away without having to serve any jail time?
Without an iota of doubt one could say enterprises at large are fraught with the challenges of dealing with the multitude of common and advanced malware attacks. As a security professional you have been constantly grappling with challenges in identifying attacks, let alone spotting the most dangerous ones.
And the...
Warning: All versions of Flash Player are vulnerable to a zero-day, weaponized exploit that became public when Italian spyware vendor Hacking Team was hacked, and 400 GB of corporate data leaked. Adobe has released an update to patch the flaw.
Workforce mobility means organizations must support BYOD, modern work styles, and the use of cloud-based applications or risk data loss, breach, and lack of ""insight"" into what data is where. The ability to work anywhere increases user productivity, but challenges IT Security pros to monitor and secure company data...
More than 3,000 National Health Service patients had their personal data exposed when an employee lost an unencrypted memory stick in a parking lot, violating NHS policies. But creating policies isn't the same as enforcing them.
Italian surveillance software maker Hacking Team has confirmed that it was hacked and recommends police, law enforcement and government agencies suspend their use of its software, pending a full breach investigation.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.