on ENISA: Software vulnerability prevention initiatives By www.databreachtoday.com Published On :: The European Network and Information Security Agency, ENISA, has compiled a list of existing initiatives focused on finding and preventing software vulnerabilities. Full Article
on FFIEC Final Authentication Guidance By www.databreachtoday.com Published On :: The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. Full Article
on Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.com Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
on APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.databreachtoday.com Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
on Hackers Try to Sell 26 Million Breached Records: Report By www.databreachtoday.com Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
on Digital Contact-Tracing Apps: Hype or Helpful? By www.inforisktoday.co.uk Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
on Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.co.uk Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
on Analysis: The Contact-Tracing Conundrum By www.inforisktoday.co.uk Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
on Live Webinar | The Fast Lane to Smart Content Governance: How Data-Centric Security Can Help You Survive (and thrive) in a Remote Work World By www.inforisktoday.co.uk Published On :: Full Article
on Continuity Amid COVID-19: Ensuring Secure Business Continuity By www.inforisktoday.co.uk Published On :: Full Article
on Your Phone and Your Face: Anchoring Users to Real Identities By www.inforisktoday.co.uk Published On :: Full Article
on ENISA Launches Guide on Building Effective IT Security Public Private Partnerships By www.inforisktoday.co.uk Published On :: The European Network and Information Security Agency has released a new guide on building effective IT security public private partnerships. Full Article
on ENISA: Technical Guidelines on Minimum Security Measures By www.inforisktoday.co.uk Published On :: ENISA has issued guidance to national telecom regulatory authorities about the implementation of Article 13a, in particular about the security measures that providers of public communications networks must take to ensure security and integrity of these networks. Full Article
on ENISA: Guidelines on Incident Reporting By www.inforisktoday.co.uk Published On :: ENISA has issued guidelines to national telecom regulatory authorities about the implementation of Article 13a, in particular, the two types of incident reporting mentioned in Article 13a: the annual summary reporting of significant incidents to ENISA and the European Commission and ad hoc notification of incidents to other NRAs in case of cross-border incidents. Full Article
on APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.inforisktoday.co.uk Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
on Hackers Try to Sell 26 Million Breached Records: Report By www.inforisktoday.co.uk Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
on Digital Contact-Tracing Apps: Hype or Helpful? By www.bankinfosecurity.com Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
on Digital Contact-Tracing Apps Must Win Hearts and Minds By www.bankinfosecurity.com Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
on Network and Security Transformation - Enabling your Digital Business By www.bankinfosecurity.com Published On :: Vistra Energy, a Texas-based power generation firm, recently underwent a network transformation project. CISO Paul Reyes, joined by Zscaler's Dan Shelton, opens up on how to make the move to cloud-based models and what it can do to support your business. Full Article
on Analysis: The Contact-Tracing Conundrum By www.bankinfosecurity.com Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
on Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2 By www.bankinfosecurity.com Published On :: Full Article
on Live Webinar | Third-Party Risk Management: How to Mature Your Program Beyond Just Outside-In Scanning By www.bankinfosecurity.com Published On :: Full Article
on FDIC: Supervisory Approach to Payment Processing Relationships with Merchant Customers By www.bankinfosecurity.com Published On :: The FDIC is clarifying its policy and supervisory approach related to facilitating payment processing services directly, or indirectly through a third party, for merchant customers engaged in higher-risk activities. Full Article
on FFIEC: Statement on End of Microsoft Support for Windows XP By www.bankinfosecurity.com Published On :: The FFIEC on Oct. 7 issued a joint statement concerning Microsoft's discontinuation of support for its Windows XP operating system as of April 8, 2014. Full Article
on FDIC: Institutions Encouraged to Work with Borrowers Impacted by Shutdown By www.bankinfosecurity.com Published On :: Five federal regulatory agencies encourage financial institutions to work with customers affected by the federal government shutdown. Full Article
on APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.bankinfosecurity.com Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
on Hackers Try to Sell 26 Million Breached Records: Report By www.bankinfosecurity.com Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
on Digital Contact-Tracing Apps: Hype or Helpful? By www.careersinfosecurity.asia Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
on Digital Contact-Tracing Apps Must Win Hearts and Minds By www.careersinfosecurity.asia Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
on Analysis: The Contact-Tracing Conundrum By www.careersinfosecurity.asia Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
on Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.careersinfosecurity.asia Published On :: Full Article
on Your Phone and Your Face: Anchoring Users to Real Identities By www.careersinfosecurity.asia Published On :: Full Article
on Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.careersinfosecurity.asia Published On :: Full Article
on JavaScript Skimmers Found Hidden in 'Favicon' Icons By www.careersinfosecurity.asia Published On :: Malwarebytes Researchers Say Attacks Appear Related to MagecartCybercriminals are hiding malicious JavaScript skimmers in the "favicon" icons of several ecommerce websites in an effort to steal payment card data from customers, researchers at Malwarebytes say. Full Article
on APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.careersinfosecurity.asia Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
on Digital Contact-Tracing Apps: Hype or Helpful? By www.databreachtoday.in Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
on Digital Contact-Tracing Apps Must Win Hearts and Minds By www.databreachtoday.in Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
on Analysis: The Contact-Tracing Conundrum By www.databreachtoday.in Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
on Ensuring Secure Business Continuity Amid COVID-19 Chaos By www.databreachtoday.in Published On :: Full Article
on Your Phone and Your Face: Anchoring Users to Real Identities By www.databreachtoday.in Published On :: Full Article
on Live Webinar | Why Automation of AST Solutions is the Key to DevSecOps By www.databreachtoday.in Published On :: Full Article
on FFIEC Final Authentication Guidance By www.databreachtoday.in Published On :: The Final FFIEC Guidance has been issued and its main intent is to reinforce the 2005 Guidance's risk management framework and update the Agencies' expectations regarding customer authentication, layered security, or other controls in the increasingly hostile online environment. Full Article
on Annual Report to Congress on Breaches of Unsecured Protected Health Information By www.databreachtoday.in Published On :: The Department of Health and Human Services' Office for Civil Rights provided a report to Congress on health information breaches from September 2009 through 2010, as required under the HITECH Act. Nearly 7.9 million Americans were affected by almost 30,800 health information breaches, according to the report. Full Article
on RBI: Security Issues and Risk Mitigation Measures Related to Card-Present Transactions By www.databreachtoday.in Published On :: The Reserve Bank of India on Sept. 22, 2011 issued a notification on security issues and risk mitigation measures related to card-present transactions. Full Article
on APT Group Wages 5-Year Cyber-Espionage Campaign: Report By www.databreachtoday.in Published On :: Naikon Hacking Group Targeted Asia-Pacific Countries With New RATOver the last five years, a hacking group that's apparently tied to China has been targeting government ministries in the Asia-Pacific region as part of a cyber-espionage campaign, according to Check Point Research. Full Article
on Hackers Try to Sell 26 Million Breached Records: Report By www.databreachtoday.in Published On :: Data Apparently Obtained From Three Breaches, ZeroFox ReportsHackers are attempting to sell a fresh trove of approximately 26 million user records apparently obtained from three data breaches, according to researchers at the security firm ZeroFox. Full Article
on Digital Contact-Tracing Apps: Hype or Helpful? By www.inforisktoday.com Published On :: Australia, India and UK Pursuing Centralized Approach Many Privacy Experts Warn AgainstTechnology is no panacea, including for combating COVID-19. While that might sound obvious, it's worth repeating because some governments continue to hype contact-tracing apps. Such apps won't magically identify every potential exposure. But they could make manual contact-tracing programs more effective. Full Article
on Digital Contact-Tracing Apps Must Win Hearts and Minds By www.inforisktoday.com Published On :: We Need These Apps, But Some Nations' Security and Privacy Follies Don't Bode WellDespite the need to battle COVID-19, several nations' in-development digital contact-tracing apps are already dogged by security and privacy concerns. Whether enough users will ever trust these apps to make them effective remains a major question. Is it too late to get more projects back on track? Full Article
on Analysis: The Contact-Tracing Conundrum By www.inforisktoday.com Published On :: The latest edition of the ISMG Security Report analyzes the many challenges involved in developing and implementing contact-tracing apps to help in the battle against COVID-19. Also featured: A discussion of emerging privacy issues and a report on why account takeover fraud losses are growing. Full Article
on Live Webinar | Strong Customer Authentication: The role of Biometrics in PSD2 By www.inforisktoday.com Published On :: Full Article