RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Read more »

Preventing Security Breaches with Passwords That Can’t Be Stolen

What would happen if hackers got hold of your database of credentials, but discovered that it didn't contain any passwords that were hashed or encrypted? Password hashfiles are the weak... Read more »

The Nitty Gritty of Sandbox Evasion

Today, many vendors are developing sandboxes to help stem the rising tide of advanced threats. Many vendors claim they can a broad range of advanced attacks. But do they? Not all sandboxes... Read more »

2014 Faces of Fraud Survey: The Impact of Retail Breaches

In the wake of the Target, Neiman Marcus and other retail breaches, banking/security leaders clearly feel abused and frustrated - and they want to see changes in how merchants conduct and process... Read more »

How to Tackle Vendor Risk Hazards: Operationalizing Third-Party Risk Management in Today’s Regulated Environment

Did you ever count the number of vendors your organization uses to run your business operations? Even mid-sized companies easily exceed one hundred third-party vendors, including technology vendors, electricity, hosting, facilities, payment,... Read more »

How to Mitigate Merchant Malware Threat

The explosion in POS malware attacks against U.S. merchants highlights the need for retailers to take bolder security steps. Troy Leach of the PCI Council and Karl Sigler of Trustwave outline key... Read more »

Fighting Cybercrime in Canada

Canada is considering adopting tougher data security and cybercrime legislation that could serve as a model for other nations, says Claudiu Popa, an information security expert who'll be a panelist at the... Read more »

‘Privacy is a Fundamental Right’

Digital privacy isn't a privilege or a policy. It's a fundamental human right, says Rajesh Vellakkat, partner in the law firm of Fox Mandal & Associates. What are today's top legal challenges... Read more »

Cyber Framework: Setting Record Straight

In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst. Read more »

Goodwill: 868,000 Cards Compromised

Malware Used in Compromise of Third-Party VendorGoodwill Industries International says in an update about a breach affecting about 330 of its stores that approximately 868,000 payment cards were exposed. It also identifies... Read more »