The National Strategy for Trusted Identities in Cyberspace (NSTIC), a government-private sector initiative, could enhance efficiency, security and privacy in all the transactions done online every day, says NIST's Jeremy Grant.
Organizations looking to improve their privacy management in the event of a breach "have to continually plan and prepare," says Nationwide's Chief Privacy Officer Kirk Herath. That means putting into writing a comprehensive plan.
Lockheed Martin, the country's largest military contractor, is investigating the root of a "significant and tenacious" attack against its information network. Could this attack be linked to the RSA SecurID hack earlier this year?
Sen. Charles Schumer's amendment to Regulation E, which aims to give local governments and school districts the same level of protection as consumers, could set an adverse precedent for financial institutions, says Doug Johnson, vice president and senior advisor of risk management for the American Bankers Association.
House Cybersecurity Caucus Co-Founder Jim Langevin, D-R.I., says President Obama's cybersecurity legislative package is a step in the right direction, but lacks the stricter regulation needed for businesses that run critical IT infrastructures.
Many organizations are unprepared to adequately respond to a breach, security expert Bob Chaput says. "Breach notification planning is just a fundamental, basic part of risk management in the new millennium," he adds.
Card-issuing banks struggle to find the balance between consumer satisfaction and protection. And in the wake of the Michaels breach, the financial industry knows it has to make a change. One industry expert says stronger card authentication is the answer, and he favors chip-based or EMV-like solutions.
The recent Sony and Epsilon breaches sent a strong reminder that companies lack transparency and aren't prepared to respond to a breach once it occurs, says Kirk Herath, Chief Privacy Officer at Nationwide Insurance Companies.
Federal authorities have issued a detailed notice of proposed rulemaking that sets out guidelines for how patients must be provided with an accounting of who has viewed their protected health information.
In a continuing effort to build a Standards and Interoperability Framework to help ease health information exchange, the Office of the National Coordinator for Health IT has launched two projects involving authentication issues.