Quantcast
Channel: Compliance & Regulations
Browsing all 389 articles
Browse latest View live

PRISM revelations spark renewed debate over privacy, legal protections

Following the leak of a classified slide deck by an NSA contractor this past June, the agency's previously secretive PRISM program entered the public spotlight and inspired vigorous debate over its...

View Article



Assessing the security red flags on healthcare.gov

On October 1, 2013, the U.S. Department of Health and Human Services green-lit the healthcare.gov website in order to serve Americans interested in and eligible for health insurance under the...

View Article

How much of a skimming risk is the Coin smart payment card?

Technological alternatives to cash and credit have entered the spotlight in 2013. New hardware and software solutions are designed to further computerize and streamline payments, and some of them have...

View Article

Target breach shows need to create more secure payment systems.

An attack on the point-of-sale systems at retail giant Target over the holidays may have exposed sensitive data, including PINs, from tens of millions of payment cards. The breach coincided with Black...

View Article

Are PCAST recommendations feasible for remaking government IT?

The most recent report from the President’s Council of Advisors on Security and Technology identified a broad range of vulnerabilities in public sector IT. The council cited government agencies for...

View Article


Mobile banking apps must be made more secure

How secure are mobile banking apps? Many individuals and organizations already trust smartphones to perform critical tasks such as reading email, working with corporate documents and conducting...

View Article

Insider misuse and error are increasingly the cause of data breaches

Data breaches have many causes, from outdated security software to employee mistakes. While enterprises have to contend with a wide array of external dangers – for example, record-setting distributed...

View Article

Encryption needs to be a bigger part of cloud security

Many organizations are gradually setting aside their reservations about cloud security and storing more company data to the cloud. This move may confer numerous benefits to them, including reduced...

View Article


The Internet is becoming more encrypted, but vulnerabilities remain

Encryption has always been a central concern for the cybersecurity community, but it has taken on added importance following the 2013 revelations of widespread Internet surveillance by world...

View Article


What to consider when improving BYOD security

By now, BYOD is nothing new for the majority of businesses. Mobile technology, for the most part, has been integrated into company processes in a range of individual organizations in every industrial...

View Article

Dealing with miscommunciation to mitigate insider threats

Although data breaches, insider threats and advanced persistent threats remain key risks for enterprises, on the technical side these organizations do not seem to lack viable solutions. Spending on...

View Article

US government increases attention on cyber security

As 2014 comes to a close and government business winds down for the year, one thing was made very clear: Cyber security is going to play a major role in 2015. First, President Obama nominated a major...

View Article

The risks of end-of-life software

Aging software can be surprisingly hard to put out to digital pasture. Microsoft Windows XP and Windows Server 2003 are both famous (or perhaps infamous) for how long they have remained in widespread...

View Article


Image may be NSFW.
Clik here to view.

Cyber security: The cooperation game

Competition is perhaps the most important component of the business sphere. After all, it's through brand and company competition that the best products end up hitting the marketplace. If Business 1 is...

View Article

Image may be NSFW.
Clik here to view.

Ransomware growth will plateau in 2017, but attack methods and targets will...

In our 2017 Predictions report, “The Next Tier: 8 Security Predictions for 2017” we state that ransomware growth will plateau in 2017, but attack methods and targets will diversify. Let’s explore what...

View Article


Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 12,...

This week marked the final Microsoft “Patch Tuesday” of 2016. Microsoft had a record-breaking year with 155 bulletins covering more than 500 CVEs. This week’s TippingPoint Digital Vaccine (DV) package...

View Article


Image may be NSFW.
Clik here to view.

Malware’s Newest Leading Lady: Alice

This week our threat researchers from our Forward-Looking Threat Research Team (FTR) discovered a new family of ATM malware called Alice. Unlike other ATM malware families, Alice’s main focus is to...

View Article

Image may be NSFW.
Clik here to view.

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of December 19,...

This week, TippingPoint announced the release of several software releases to customers including Security Management System (SMS) v4.5.0; Intrusion Prevention System (IPS) v3.9.0; and TippingPoint...

View Article

Image may be NSFW.
Clik here to view.

This Week in Security News

Welcome to our weekly roundup, where we share what you need to know about the cybersecurity news and events that happened over the past few days. Below you’ll find a quick recap of topics followed by...

View Article
Browsing all 389 articles
Browse latest View live




Latest Images