Emerging cybersecurity risks are now banking institutions' top concern, says the ABA's Heather Wyson-Constantine. What are institutions' contractual protections in the wake of a third-party data breach? Read more »
To better secure enterprise networks, as well as detect and respond more rapidly to data breaches, businesses need to know the who, what, where, when and why of all endpoints that connect... Read more »
Malaysia's cybersecurity chief believes awareness is vital to establish security readiness to stay ahead of threats. Dr. Wahab's agenda includes developing security centers of excellence to fight threats. Read more »
Malware researchers can track important technical details about attacks, but shutting down cybercrime networks requires law enforcement agencies to take the next step, says Alexander Erofeev of Kaspersky Lab. Read more »
To deliver effective information sharing and threat intelligence, the security industry must settle on a single set of threat-sharing standards, says David Duncan of the Internet security firm Webroot. Read more »
Class-Action Suit Was Filed Over Compromised Cards, AccountsAdobe Systems plans to settle a class-action lawsuit filed after its 2013 breach. By settling, Adobe avoids potentially damaging public discussions about its security practices,... Read more »
Rogue applications designed to impersonate a company's corporate brand are increasingly prevalent, offering attackers an easy way to fool online users into downloading malicious apps aimed at compromising credentials, says Arian Evans... Read more »
Attendees Flock to Sessions, Tchotchkes, Selfie SticksThe buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an... Read more »
As the U.S. completes its payments migration to the EMV chip, merchants and card issuers should be bracing for an uptick in card-not-present fraud, says Carol Alexander, head of payment security at... Read more »
To secure the growing number of devices being used within enterprises requires organizations to be sure they're providing the right access to the right resources for the right people, says Ping Identity's... Read more »