FTC Breach-Related Actions Could Influence Other Agencies

Attorney Chris Pierson on How FTC Probes May Spur More Regulatory OversightIn this video interview, cybersecurity attorney Chris Pierson says recent Federal Trade Commission actions linked to data security and breach response could influence other governmental agencies. from DataBreachToday.com RSS Syndication http://ift.tt/1RKMjfP via security

New Cybersecurity Task Force: Will It Make a Difference?

David Finn, a former healthcare CIO, says he agreed to join a new Department of Health and Human Services cybersecurity task force because he supports its mission of involving representatives of all healthcare sectors in the effort to tackle challenges. In this interview, he outlines key security issues. from DataBreachToday.com RSS Syndication http://ift.tt/1Y16Wcd via security

Achieving Advanced Threat Resilience: Best Practices for Protection, Detection and Correction

Most organisations are at a disadvantage when it comes to fighting against cyberattacks. They still rely on a variety of point tools, most of which don’t integrate well with one another and leave gaping holes in their overall security. Moreover, they lack insight into their security posture, making it difficult to prioritise and remediate against […]

Millennials’ Mobile Banking Usage Is Now Close to 70%

For Gen Y, the rallying cry was, “I want my MTV.” For Millennials, the cry might as well be, “I want my mobile banking.” About 67% of Millennials now use mobile banking, according to a study released today by the Federal Reserve. This compares to 18% for those consumers aged 60Read More from Bank Innovation http://ift.tt/1V546Uu […]

Achieving Advanced Threat Resilience: Best Practices for Protection, Detection and Correction

Most organisations are at a disadvantage when it comes to fighting against cyberattacks. They still rely on a variety of point tools, most of which don’t integrate well with one another and leave gaping holes in their overall security. Moreover, they lack insight into their security posture, making it difficult to prioritise and remediate against […]