U.S. information breaches involving third-party business associates doubled in the first half of the year, says Karen Barney of the Identity Theft Resource Center. Find out the other results of the group's breach study.
"Clearly, the market has not developed ... on its own the cybersecurity requirements," John Brennan says. "Of course, if it did, then we wouldn't have these intrusions and the billions of dollars of losses that companies are now writing off."
The great thing about fraud examination is that you can really play to your own strengths when choosing a career. The following six job roles are just a few of the career paths a fraud examiner might take.
The federated data model of a long-running Massachusetts HIE has its members safeguarding their own data. Find out the other ways that "pushing" data helps the New England Healthcare Exchange Network protect patient information.
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Understanding threats and identifying modern attacks in their early stages is key to preventing subsequent compromises, and proactively sharing information among organizations is an increasingly effective way to identify them.