Banking & Finance April 30, 2015 Behind the Security Conference Curtains: A Q&A With Katherine Teitler, MIS Training Institute’s Director of Content 6 min read - Katherine Teitler, content director for major security conferences, sat down with IBM to discuss what goes into choosing security conference speakers.
Banking & Finance April 30, 2015 The Damage of a Security Breach: Financial Institutions Face Monetary, Reputational Losses 2 min read - The financial services sector is facing a barrage of attacks, with many institutions having been subjected to damaging security breaches recently.
Application Security April 29, 2015 No Authentication Without Trust 3 min read - Identity authentication should only be conducted after the person trying to access data or information has been deemed trustworthy by the organization.
Fraud Protection April 29, 2015 How Are You Managing Your Health Care Fraud? 3 min read - Health care fraud is an ever-increasing problem, and organizations must audit and train their employees to make sure their systems can stay secure.
Government April 29, 2015 Feds Move Toward HTTPS Website Encryption 2 min read - A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
April 28, 2015 Startup Says AC Power Could Be the Secret to Spotting Medical Device Malware 2 min read - A startup demoed technology at the recent RSA Conference that shows how AC power could detect medical device malware and fend off cybercriminals.
April 28, 2015 Bodyprint Biometrics: Are People the New Password? 2 min read - Yahoo has introduced a new type of biometric security, Bodyprint, which allows users to unlock their mobile devices with multiple body parts.
CISO April 28, 2015 C-Suite Spotlight: Maximus VP Jamie Giroux < 1 min read - Jamie Giroux of Maximus, a managed health care, human services and workforce management solutions provider, discusses the state of security.
Application Security April 28, 2015 Software Defenses to OWASP’s Top 10 Most Common Application Attacks 6 min read - Software developers must learn how to build security in from the ground up to defend against the most common application attacks, as determined by OWASP.
Mainframe April 28, 2015 Study: Basic Needs Critical Infrastructure Sectors Account for 8 Percent of All Incidents in 2014 2 min read - According to a recently released IBM study, the basic needs critical infrastructure sectors accounted for 8 percent of all security incidents in 2014.