Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
In...
VirtualBank, Money Magazine's "Best Online Bank", recently implemented out-of-band authentication to protect its customers from the myriad attacks targeting online banking today. By enabling phone-based authentication, VirtualBank can offer their customers both unparalleled protection and a superior user experience.
...
Business risks have grown in size and complexity in 2009. How, then, must risk management evolve to meet the challenges of 2010?
James Pajakowski, EVP of Global Risk Solutions with Protiviti, shares his insight on:
The risk management trends for 2010;
How information security professionals must meet the new...
The Department of Homeland Security launches a aimed to furnish stakeholders and the public with easy accessible information in securing the nation's critical infrastructures and key resources.
Is your organization vulnerable to a security breach or regulatory action because of its inaccurate time-setting practices?
Too often we take time for granted. Yet, it's critical to securing our operations and validating the integrity of our data - especially in the event of a security breach or a legal action....
For the fourth time in a year, the Federal Trade Commission (FTC) has extended the enforcement deadline for state-chartered credit unions and non-banking entities covered by the Identity Theft Red Flags Rule.
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Increased demand during a severe pandemic could exceed the capacities of Internet providers' access networks for residential users and interfere with teleworkers in the securities market and other sectors, the Government Accountability Office says.
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
Organizations are leaping to embrace "cloud computing" - accessing virtualized resources via the Internet. But are they jumping too soon without weighing all the legal considerations regarding security and privacy? Register for this webinar to hear a government security leader's expert insights on:
e-Discovery and...
We all can see the technological and market forces converging to necessitate and enable electronic healthcare records.
But how does this transition impact privacy and compliance within an organization? What are the ramifications for IT and security departments?
Kim Singletary, Solutions Marketing for McAfee,...
Of all the compliance regulations, mandates and guidelines, you're most likely to encounter PCI. Any vendor, organization, entity, group, business, etc., that accepts and processes credit cards falls under the PCI requirements standard and is subject to its audit cycles.
PCI DSS covers a range of physical and...
The same biometric tool to identify a friend or foe in combat can be repurposed back in the states to help secure military installations, says Biometrics Task Force Assistant Director Lisa Smith.
Interview with Myra Gray, Director, U.S. Army Biometrics Task Force
Though fingerprint and iris scans have advantages over passwords and magnetic identity cards as a means to grant access to IT systems, in many instances, the biometric technologies aren't ready to be employed alone, says Myra Gray, director of the...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.