Lawsuits that card issuers have filed against Target to help recoup expenses associated with the retailer's breach aren't likely to reap big rewards, two legal experts say. But they are sending a strong message.
You'd think that preventing damage caused by cyber-attacks would be incentive enough to get organizations to adopt cybersecurity best practices. But the government is working with industry to develop incentives to encourage adoption.
Despite their differences on certain issues, the Financial Services Roundtable and the Retail Industry Leaders Association have joined forces in an effort to prevent breaches by enhancing cybersecurity and threat intelligence sharing.
Many endpoints in the healthcare sector, including medical devices, are being hacked because of inadequate security, according to a new study from the SANS Institute that identified apparent vulnerabilities at 375 organizations.
Merrill Halpern of the United Nations Federal Credit Union, a pioneer in the use of chip cards, says high-profile retail breaches reinforce the long-term value of EMV for various forms of payment within the U.S.
Now that the cybersecurity framework has been released, security experts are pondering whether the voluntary approach to following the guidance might eventually need to be replaced by some sort of mandate.
While many organizations rely on employee training to help mitigate the risks of spear phishing, such efforts are generally ineffective, says Eric Johnson of Vanderbilt University, who explains why a technical solution might be better.
Website security firm CloudFlare is warning organizations worldwide to be on the lookout for an increase in larger DDoS attacks. But these NTP attacks are far less sophisticated than the earlier DDoS attacks that targeted U.S. banks.
The RSA Conference 2014 will be held Feb. 24-28 in San Francisco, and Information Security Media Group will be the only Diamond Media Sponsor. Learn what's on the agenda at this world-class security event.
NIST has unveiled its long-awaited cybersecurity framework, which provides best practices for voluntary use in all critical infrastructure sectors, including, for example, government, healthcare, financial services and transportation.
Employing quantum physics, Yi-Kai Liu, a computer scientist at the National Institute of Standards and Technology, is attempting to devise a way to create a one-shot memory device that could help secure transactions or administrative passwords.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."