Employing quantum physics, Yi-Kai Liu, a computer scientist at the National Institute of Standards and Technology, is attempting to devise a way to create a one-shot memory device that could help secure transactions or administrative passwords.
Expenses linked to the data breach at Target Corp. have already cost the 58 member institutions of the Consumer Bankers Association more than $170 million - a price they should not have to pay, says the association's David Pommerehn.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Today's threat landscape is rapidly expanding to include cyber-attacks attributed to nation states. How must organizations respond? Mike McConnell, former U.S. National Intelligence Director, shares insight.
U.S. prosecutors say a Romanian man faces six charges that he directed a large-scale ATM skimming scheme that defrauded multiple financial institutions out of at least $5 million.
CISOs in Maryland are volunteering to offer small and midsize businesses free advice on a variety of security issues to help them mitigate cyber-attack risks.
The UK Information Commissioner's Office has fined the Department of Justice Northern Ireland £185,000 after a filing cabinet that contained personal information about victims of a terrorist incident was sold at an auction.
The ongoing epidemic of health data breaches involving unencrypted laptops demonstrates why many healthcare organizations need to conduct more meaningful risk assessments, says security expert Dan Berger.
Organizations in all sectors can improve their compliance with the PCI Data Security Standard by taking five critical steps, says Rodolphe Simonetti of Verizon Enterprise Solutions, which just issued a new PCI compliance report.
Attorney Kim Peretti helped put TJX hacker Albert Gonzalez behind bars, and now she is helping organizations investigate and respond to their own data breaches. What tips and tools does she recommend?
Some people say the U.S. faces a cybersecurity staffing shortage. Renowned computer science professor Eugene Spafford disagrees. He discusses what he sees as the real shortage and what we can do about it.
A government watchdog plans a variety of activities to scrutinize the data security practices of healthcare providers, including hospitals' security controls over medical devices. It also will take a close look at the HealthCare.gov website.
Security experts disagree about whether the breach of a refrigeration vendor is ultimately to blame for the network attack that compromised Target. Here, they explain their views.
The U.S. Army Criminal Investigation Command is warning current and former service members to stay clear of a false benefits website that's attempting to collect account log-in information.
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.