New guidance from the National Institute of Standards and Technology defines an information security continuous monitoring strategy and shows how organizations can create an information security continuous monitoring program.
"The same American ingenuity that put a man on the moon also created the Internet," President Obama says. "We must now harness that spirit of innovation to ... secure technologies to build a safer, more prosperous future for all Americans."
Federal authorities have hired a contractor to design, develop and test ways to electronically obtain and record patients' consent to exchange their information.
From the earthquake in Japan to Hurricane Irene in the U.S., organizations worldwide have found their business continuity and disaster plans tested. But what lessons must we draw from these incidents?
Ten years after the 9/11 attacks, many organizations still need to do a better job of monitoring their networks for threats, says security specialist Mac McMillan.
BSA and AML compliance are priorities that never get pushed aside. So what steps are banks and credit unions taking to ensure they comply with regulators' demands?
Elayne Starkey recently gave up her BlackBerry for an iPhone, and uses the Apple mobile device for personal and work doings, securely connecting to the computer system of her employer, the state of Delaware.
Successful wire fraud attacks cause losses averaging between $100,000 to 200,000 per victim. So, it's not surprising that banks are being sued by business customers for alleged failures to prevent fraud via ACH.
BofA's announcement to charge customers for debit transactions is likely just the beginning, as banks across the U.S. react to debit interchange cuts that take effect Oct. 1.
Major breaches involving lost or stolen storage media point to the need to take better security precautions when storing massive amounts of patient information.
When it comes to mobile banking, which do you believe is the greater security risk: the latest evolution of malware or continued bad behavior by the end user? Experts' answers may surprise you.
It's been well over a year since the passage of the Dodd-Frank Wall Street Reform and Consumer Protection Act. How should banking institutions prepare for the hundreds of new regulations expected to come as a result of this landmark legislation?
About 4.9 million patients treated in San Antonio area military treatment facilities since 1992 have been affected by a health information breach involving the theft of backup tapes for electronic health records.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.