The U.S. payments infrastructure will come up far short of completing the rollout of EMV technology by the Oct. 1 fraud liability shift date. Experts say high costs, a perceived lack of consumer demand and doubts about EMV's ability to significantly reduce card fraud are to blame.
Adjusting risk management strategies in the aftermath of the newly discovered hacker attack on Excellus BlueCross BlueShield, as well as other recent massive cyber-attacks, will be among the hot topics discussed at the Healthcare Information Security Summit in San Francisco on Sept. 17.
As criminals get more savvy about circumventing financial institutions' fraud prevention controls, fraud-fighting collaboration among institutions and law enforcement officials is becoming more important, says Clyde Langley, a former FBI agent who'll be a presenter at ISMG's Sept. 15 Fraud Summit San Francisco.
If there's one thing federal regulators want to drill into the heads of covered entities and business associates about data breach prevention, it's this: Stop procrastinating, and conduct a risk analysis and encrypt most of your computing devices right away.
BlackBerry plans to buy mobile device management rival Good Technology for $425 million. BlackBerry must prep for a future in which it no longer manufactures hardware - and that's why this deal makes sense.
Policymakers must consider three factors before imposing sanctions in retaliation for state-backed hacks: Confidence in its attribution of responsibility, the impact of the incident and the levers of national power at a state's disposal.
Information security experts offer two timely Apple iOS device reminders: First, never jailbreak the devices. Second, enterprise security managers must ensure that they ruthlessly block any jailbroken devices from accessing corporate networks because they pose a security risk.
Former U.S. Secret Service agent Shaun W. Bridges has pleaded guilty to stealing $820,000 worth of bitcoins during the U.S. government's investigation into the underground narcotics marketplace known as "Silk Road."
The FBI has arrested a former manager at Machine Zone, which makes the multiplayer "Game of War: Fire Age," over allegations that he attempted to bargain sensitive corporate information for a better severance package.
CISOs who want to keep more cyber-attacks from succeeding should focus on decreasing the half-life of vulnerabilities, which refers to the amount of time it takes half of all systems affected by a vulnerability to get patched. That's the advice from Qualys' Wolfgang Kandek.
Is a hackable car defective? The auto industry likens hack attacks to troublemaking. But legislators and regulators are taking a closer look at connected cars and the safety risks posed by software bugs.
Three years after hacktivists targeted U.S. banks with a series of DDoS attacks, the size and magnitude of attacks continue to grow, but they're now more likely to be designed to facilitate fraud. Here's an update on the status of banks' mitigation strategies.
Hacker attacks often start with spear-phishing attempts, but healthcare entities can take steps to help prevent these scams from being successful, says Connie Barrera, CISO of Jackson Health System in Miami, who describes her organization's approach.