Today ends National Cybersecurity Month, and one thing is clear: cybersecurity awareness does not equate secure cyber. "The market still doesn't appreciate how much good cybersecurity is worth," Rep. Jim Langevin says.
Heavily regulated industries like banking and healthcare have been reluctant to make the virtualized leap to the cloud, fearing a loss of control could open them to unforeseen risk. Are their concerns unfounded?
Occupy supporters plan today to protest at several banks' headquarters in NYC. Coming on the heels of cyberattacks that targeted police in Boston, how worried should banks be about growing physical threats and cyberattacks waged by Occupy sympathizers?
New research from Carnegie Mellon University's Software Engineering Institute provides further evidence why IT security isn't just the problem of an enterprise's security organization but of its top non-IT leadership as well.
Phishing schemes that aim to gather credit and debit details are on the rise. The American Bankers Association offers tips on exactly what you should tell your employees and customers about the latest scams.
The U.S. explosion in card skimming will be the ultimate catalyst for change from mag stripe to chip and PIN technology. "I do believe that shift has begun," says SVB's Pradeep Moudgal. "Everyone wants to be in a much more secure environment."
As it seeks information from vendors about implementing a more robust mobile device management system to ensure security, the Department of Veteran's Affairs has reported its first case of a stolen iPad.
Pradeep Moudgal of California-based SVB says the bank's decision in June to migrate commercial credit cards over to EMV was easy. "The biggest advantage of the chip card, at the end of the day, is to reduce fraud," he says.
"Matching an implementation to the cloud definition can assist in evaluating the security properties of the cloud," says computer scientist Peter Mell, author of The NIST Definition of Cloud Computing.
Roger Baker, CIO at the VA, says desktop computers will eventually phase out, as mobile devices become predominant channels for communication and work. That evolution has made plans for ongoing mobile security a priority for organizations that cross every business sector.