The Unisys Security Index shows growing public anxiety about Internet security. Unisys CISO Patricia Titus wonders how restless the public would be if the poll was conducted after revelations of breaches at RSA, Epsilon and Sony.
Personalized medicine research, which relies on genetic information paired with electronic health records, could pave the way for many treatment breakthroughs. But because of the sensitive nature of the information involved, pioneers in this field must take extra privacy and security precautions.
Bankers aren't waiting for the FFIEC to act on the release of its updated online authentication. Instead, they've already begun to comply with the major points recommended in the draft. And the death of Osama bin Laden has heightened concerns terrorists' efforts to launder money through legitimate banking channels.
Wire fraud incidents from China prove current security measures, including multifactor authentication, are too easy to bypass. And security pundits say it all points back to why the financial industry needs more guidance about adequate online security.
Big brother isn't the relation the government sees itself portraying in developing the National Strategy for Trusted Identities in Cyberspace. Uncle Sam has a more avuncular role in mind, giving advice and serving as a role model.
"On a global basis, countries are recognizing that they need a uniform commercial code, if you will, for data - a unified approach for managing IT infrastructure services," says Marlin Pohlman of the Cloud Security Alliance.
One of the most significant conferences of the year devoted to healthcare information security issues will be held next week in Washington, and we'll be providing full coverage.
From mobile devices to social media and cloud computing, IT governance is all about risk management. "You can't de-risk everything, but you can de-risk the majority of circumstances you will see in normal operations," says governance expert Robert Stroud.
The non-standardized collection device is responsible for 13 percent of the biometric records maintained by DOD, representing some 630,000 DoD records that cannot be searched automatically against FBI's database of about 94 million records.
Intel CISO Malcolm Harkins says the Sony PlayStation breach reminds CISOs in all sectors that such incidents can't be avoided, but their risks can be managed.
In his first three weeks on the job, Farzad Mostashari, M.D., national coordinator for health information technology, made good on his pledge to improve communication in his office.
A review of the month's top stories by Managing Editor Tracy Kitten: A well-crafted e-mail tricked an RSA employee into opening a phishy e-mail that launched a sophisticated attack on the company's information systems, and the list of big-name corporations and brands affected by the Epsilon e-mail breach tops 100.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.co.uk, you agree to our use of cookies.