Data security used to be about building firewalls and protections around the data. Now it's about securing the data itself. That's why data is the new perimeter, says Charlie Pulfer of Titus.
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
Next-generation threats require a next-generation firewall. Steve Pao of Barracuda Networks discusses his company's new firewall solution and the new levels of protections it offers.
One of the biggest challenges facing organizations is that fraudsters constantly change the way they try to cheat banks and other organizations, says Rajib Roy, president of Equifax Identity and Fraud Solutions, which provides advanced analytics and proprietary technology to deliver customize insights for identity...
Balancing the customer experience with risk mitigation is tricky, says Jon Karl of Iovation. But automating customer reputation profiles can help organizations take the guesswork out of fraud prevention, and improve the experience on both sides of the transaction.
Most organizations have more data than they know what to do with, much less understand how they can use that data in a meaningful way, say NopSec's Lisa Xu and Steven Leonard. Having the ability to aggregate that data is key.
Automating governance, risk and compliance reduces vulnerabilities that can have an adverse impact on the bottom line, says Sergio Thompson-Flores, chief executive of Modulo, a provider of GRC offerings.
Banking institutions need to ramp up their ability to deal with security issues as they roll out more mobile banking applications, says Andrew McLennan of Metaforic.
Combining a network access control system with a mobile device management system is a good way to address security for BYOD, says Scott Gordon of ForeScout.
Advanced persistent threats are evolving, and banks can help thwart them by using continuous monitoring for real-time detection, says J. Paul Haynes of eSentire.
Companies developing their own mobile applications must take steps to ensure their security policies are followed no matter where or how the apps are used, says Kurt Stammberger of Mocana Corp.
Security leaders know their old perimeter-based security models are insufficient. But what new model is best? And how can it reduce reliance on passwords for authentication? Julian Lovelock of HID Global offers insight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.