The Federal Reserve's strategy for oversight of the U.S. migration toward faster payments won't change in the wake of the heists that exploited SWIFT payments, says Fed official Marianne Crowe. The long-term security of U.S. payments has always been a priority for the Fed's study of faster payments, she says.
Some healthcare entities may be more likely than organizations in other sectors to pay extortionists to unlock data that's been encrypted in ransomware attacks because patients' lives are potentially at risk if data is unavailable, says security expert Kate Borten, who discusses risk management issues.
As CSO and CTO of Arbor Networks, Sam Curry is in a rare position: He can set security strategy and then go out and find the tools to execute it. Where does the human factor enter the equation, and how must we re-think our traditional strategies?
In just two years' time, RSA analysts have seen a 170 percent rise in incidents of fraud via the mobile channel. What's behind the spike, and what can security leaders do to help their organizations and customers curb fraud losses?
Bank of the West's new approach to the insider threat is focused less on detection, more on preventing fraud in the first place. David Pollino tells why a "noisy" insider fraud program is more effective than covertly monitoring employee activity.
In a video interview, FBI supervisory special agent Dan Wierzbicki says the bureau wants to work with businesses to improve the information in its cybersecurity alerts as well as to identify threats sooner.
Despite police disrupting alleged DDoS extortion gangs such as DD4BC, inexpensive stresser/booter services have enabled copycats to continue these attacks, says Akamai's Martin McKeay. Here's how organizations can defend themselves.
Preparing for data breaches - to detect them quickly, respond appropriately and ascertain exactly what happened - can help make the difference between a security incident having major or minor repercussions, says CrowdStrike CEO George Kurtz.
A massive scan of open internet ports confirms long-held assumptions that old, insecure internet protocols never die, and in fact may still thrive, especially in Belgium, says Rapid 7 security research manager Tod Beardsley.
Mike Daugherty, the president and CEO of LabMD who is fighting a legal battle with the FTC over two security indents, explains why he believes the agency is overstepping its regulatory authority. And he says that new FTC probes into PCI compliance and EMV deployment could be on the way.
Cyberattacks have gained regulatory attention worldwide. But the world doesn't need more regulation to address new threats, says Steve Durbin of the Information Security Forum. Instead, government must work more closely with the private sector.
Upticks in point-of-sale fraud and surges in ATM skimming are hitting community banks hard, Doug Johnson of the American Bankers Association says in this video interview. Why are smaller institutions feeling the pain?
Too few organizations have in-house incident response teams. As a result, they lack the native ability to even detect evolving threats, such as ransomware, says Ann Barron-DiCamillo of Strategic Cyber Ventures in this video interview. What are the must-have response capabilities?
Today's threat actors are more focused, funded and disruptive than ever. But the cybersecurity defense industry is not built to respond appropriately, thought leader Tom Kellermann of Strategic Cyber Ventures says in this video interview. What are security leaders overlooking?
To fight the growth of card fraud, retailers need to take a multichannel approach, says Randy Vanderhoof of the EMV Migration Forum. In addition to EMV, retailers must invest in tokenization and encryption, he says in this video interview.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.