Days before the release of the Obama administration's cybersecurity framework, Senate Republicans issued a report detailing vulnerabilities in federal IT, suggesting the White House get its own house in order.
Several payment system experts testifying at a Senate hearing on Feb. 3 urged the adoption of chip card technology in the wake of breaches at Target Corp. and Neiman Marcus. But representatives of banking and retailing engaged in some finger-pointing.
The PCI Security Standards Council has no plans to modify its standards for payment card data security in response to high-profile payment card breaches at Target and Neiman Marcus, says Bob Russo, the council's general manager.
In light of recent high-profile retail breaches, The Financial Services Roundtable is asking Congress to pass a national data breach notification law and expand oversight of the retail and telecommunications sectors.
A bill that backers say would fortify the IT security of the nation's critical infrastructure and government by codifying, strengthening and providing oversight of the mission of the DHS has cleared its first hurdle.
Undeterred, two senators will try again to get their colleagues to enact legislation that they contend would better safeguard sensitive information and notify consumers of a data breach when personally identifiable information is exposed.
Target Corp.'s revelation that personal information about up to 70 million customers was breached in a recent malware attack raises new questions about Target's security practices and risks to consumers.
While preparing a speech to be delivered in Korea, NIST's Ron Ross wanted to convey the message of the importance of computer security. He hit on five themes - threat, assets, complexity, integration and trustworthiness - which form the acronym TACIT.
Four years after the Commission on Cybersecurity for the 44th Presidency, the panel's co-chair - Harry Raduege - is cautiously optimistic that many of its recommendations could be adopted in 2013.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing securityintelligence.inforisktoday.com, you agree to our use of cookies.