to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

Annual Report to Congress on Breaches of Unsecured Protected Health Information

The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report.




to

RBI: Know Your Customer Norms - Letter Issued by UIDAI

The Reserve Bank of India on Sept. 28, 2011, issued a statement recognizing a letter issued by Unique Identification Authority of India containing details of name, address and Aadhaar number, as an officially valid document as contained in Rule 2[1][d] of the PML Rules, 2005.




to

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2




to

Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning




to

NAFCU's Comments to Federal Reserve on Interchange Fraud Adjustment

Fred. R. Becker Jr., president and CEO of the National Association of Federal Credit Unions, on Sept. 28, 2011, submitted comments to the Federal Reserve Board's Jennifer Johnson on its interim final rule on the fraud adjustment for debit card interchange fees.




to

FDIC: Sun Security Bank, Ellington, Mo., Closes

Sun Security Bank, Ellington, Mo., was closed by the Missouri Division of Finance, which appointed the Federal Deposit Insurance Corp. as receiver.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2




to

Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

The service is no longer available. Please refer to our RSS help page for information about changes to feeds.




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

ENISA: Cybersecurity Aspects in the Maritime Sector

ENISA has published the first EU report ever on cybersecurity challenges in the Maritime sector. This principal analysis highlights essential key insights, as well as existing initiatives, as a baseline for cybersecurity. Finally, high-level recommendations are given for addressing these risks.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

ENISA: App-Store Security - The Five Lines of Defense

The European Network and Information Security Agency published a new report on app-store security where it advocates for a baseline set of "five lines of defense" against malware.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Bangladesh CIRT to Build Sensor Network for Banks

The Bangladesh eGovernment Computer Incident Response Team, or CIRT, is taking several steps to strengthen cybersecurity, including building a sensor network to help enable all banks to share threat intelligence, says Tawhidur Rahman, CIRT's head of digital security and diplomacy.




to

Telework Leads to Changes in India's 2020 Cybersecurity Policy

India is modifying its 2020 National Cybersecurity Policy to take into account the shift to teleworking as a result of the COVID-19 pandemic, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)




to

Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps




to

RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions

The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions.




to

RBI: Transaction Limit Update to Mobile Banking Circular

The Reserve Bank of India has updated its mobile banking circular, dated Dec. 24, 2009, removing the 50,000 Rupees per customer, per day limit.




to

Hackers Try to Sell 26 Million Breached Records: Report

Data Apparently Obtained From Three Breaches, ZeroFox Reports
Hackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox.




to

Your Phone and Your Face: Anchoring Users to Real Identities




to

Live Webinar | How to avoid the security dangers with working from home (WFH)