GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
Information security personnel are challenged with protecting company reputation and enterprise and customer data from a constant and expanding barrage of cyber criminals.
Version 3.0 of the PCI Data Security Standard (PCI DSS) and the Payment Application Data Security Standard (PA-DSS) became available today.
One issue with password systems has always been the 'reset' problem: what to do when a user forgets their password.
While already ubiquitous in much of the world, mobile payment options are gaining traction in the United States, reports Stephen Lawton.
So far, one solution, developed by European Payment Services, has been verified under PCI security standards for point-to-point encryption (P2PE) hardware.
In a perfect world, enterprises would know exactly when an auditor is going to show up, the questions they will ask, and data would be presented on a silver platter ready to prove the organization's compliance.
A major area of concern for security personnel these days is how we are able to achieve and maintain compliance with multiple regulatory governing bodies.
Business associates of HIPAA-covered entities are now legally bound to follow the same guidelines when securing patients' protected health information.
There are a few key things every business should consider to truly improve data security.
Robust enterprise security requires more than checking compliance boxes, says Diebold CSO Adam Williams.
The promise of governance, risk and compliance technology is alluring, but getting it to work effectively is a different story, reports Alan Earls.
The latest version of the payment security industry's data safeguarding standard should also include mandates and guidance around risk management, penetration testing and mobile.
Facebook has released its first-ever transparency report, a document breaking down the number of worldwide government requests for data on users. Not surprisingly, the U.S. is far and away the leader.
The council released a highlight of potential new requirements and guidance to the PCI Data Security Standard and Payment Application Data Security Standard, both due out in November.
To effectively mitigate mobile risk, organizations should employ the same content security capabilities, and ideally leverage the same content policies and rules in mobile environments.
The tentative list of incentives would entice companies to participate in the "Cyber Security Framework," a measure that aims to help the nation stave off industrial attacks.
To address today's threats, companies require a high degree of convergent perspective, information expertise, and coordination between personnel and groups.
An upcoming update of a credit card standard offers an opportunity to assess overall security, says Symcor's Della Shea. James Hale reports.
Finding each sensitive document and email in a massively growing data center is near impossible, but finding all of them requires a simpler strategy.
Most companies actually require only a small IT operational team, and can greatly reduce the costs associated with ensuring compliance and security.
According to a Citizen Lab report, security firm Blue Coat also may have violated U.S. sanctions that bar the sale of technologies to countries with a history of human rights grievances, such as Iran, Syria and Sudan.
A study has found that 40 percent of IT security professionals weren't sure if their organizations were compliant with laws governing mobile data.
There are a number of organizations out there that ask for — and often receive — access to data on both successful and unsuccessful attacks on your technology infrastructure.
In order to achieve implementation throughout the various units of a business, a chief compliance officer must be put in charge of coordinating the security pros running the network to the managers all the way up to the boardroom.
Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.
As interest in the public cloud remains strong, a security expert makes sense of new recommendations for securing payment card data in those environments.
Sportswear retailer Genesco is suing Visa after the credit card company imposed more than $13 million in fines.
When it comes to credit card fraud, the hospitality industry has offered an attractive target for cyber criminals. Now, one trade group is helping these properties overcome security and compliance hurdles with a new framework.
Lawmakers have begun debate on the controversial threat information-sharing bill known as CISPA, which would complement the president's cyber security executive order. But it has a host of privacy objections to clear first.
The Payment Card Industry Security Standards Council (PCI SSC) released recommendations for card data security and compliance in cloud environments.
Depending on an organization's size, managing the attack surface isn't as simple as checking items off a list.
The council charged with administering the PCI standard has documented common vulnerabilities in online payment environment and offered suggestions for installing technology to deter threats.
Bryant Bell, senior product marketing manager of Guidance Software, sits with SC Magazine reporter, Danielle Walker, to discuss some of the benefits of having legal counsel in the security industry.
January is a good time to plan. It's the start of a new year and those things that seemed so far away in December are suddenly right around the corner.
The Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security rules undergo their biggest changes since the legislation was passed in 1996.
It's time for an anthropological approach that protects users based upon enablement, not disablement.
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.
We all know what we spend internally, but how do we get reliable, timely information for comparison purposes?
The Center for Copyright Information attributes the push back to Hurricane Sandy-related testing delays.
The PCI Security Standards Council, the body that manages payment security industries guidelines, on Friday released a methodology for meeting a risk management requirement included in the standard.
A South Carolina attorney has amended a lawsuit to include compliance assessor Trustwave as a defendant, opening the door to whether a security provider can be held liable for a breach at a customer's site.
At SC Magazine's Chicago security conference, professionals from various industries aimed to simplify strategies for tackling security guidelines and regulations.
Video game players are used to fending off alien invaders, but the IT staff at Electronic Arts (EA) was challenged to reduce cyber risk within its own environment.
At a recent SC Magazine Rountable, information security and compliance professionals discussed how changes in technology are leading to an evolution in their roles.
In a major victory for organizations that have sustained massive losses due to unauthorized transactions made by hackers, an appellate court has ruled in favor of a Maine construction company against its bank.
Global companies facing a slew of regional laws, as well as small and midsized companies required to meet regulatory demands, need governance, risk and compliance solutions.
In 1854, an English physician was one of the first to use an epidemiological method to ID disease risk. Ben Sapiro of the Dominion of General Insurance Co. wants his peers to do the same with security.
For the first time, breached processor Global Payments disclosed on Tuesday that a number of card brands have removed the company from their approved list of service providers.
Adopting PCI DSS is a sensible thing to do from a security perspective, says New Net Technologies' Mark Kedgley.
A privacy officer at a global company found a way to collaborate efficiently at a top level, while ensuring the protection of company assets, reports Greg Masters.
Canada's Bill C-11 leaves us with a few concerns and unanswered questions when it comes to rules and restrictions on the process of data backup.
The primary driver for security should be to cut risk rather than attempting to churn through an unending string of audit and compliance exercises.
Fortinet's Greg Fitzgerald discusses major vulnerabilities, data management, and privacy and compliance issues in the industry at this year's RSA Conference 2012 in San Francisco.
A panel discussion on risk management hovered around issues of balancing the scientific element of data gathering with the art of interpreting the information.
DLP solutions remain fairly immature, but the need to protect and monitor sensitive information is greater than ever.
Businesses are forced to implement specific security mandates even if they don't support their actual security goals.
West Virginia University was looking to protect student and staff data. It found a software solution to assist in the process, reports Greg Masters.
A community college in Texas found a tool that enabled it to fend off viruses while coming into compliance, reports Greg Masters.
Health care providers and their patients both have parts to play in the high-stakes game of protecting sensitive medical information, especially as technology becomes easier to implement and enforcement of regulations intensifies.
While the nation's economy remains in the tank, the information security market appears to be avoiding a major slowdown.
Throughout the day, SC Magazine will be announcing the finalists from each of its 32 award categories. Now, let's turn to our Excellence section.
Check Point Software Technologies bolstered its portfolio Monday with the acquisition of privately held Dynasec, a 7-year-old, Israel-based provider of governance, risk management and compliance solutions.
An overreliance on compliance and limited information sharing between the federal government and the private sector have resulted in attackers holding a firm edge over security professionals. How do we take back a decade of losing?
Beginning in October, federal agencies will be required to report on their information security posture on a monthly basis, instead of annually.
The city of Richmond, Va. found a solution to help prevent trojans from entering the gates, reports Greg Masters.
The prescriptive nature of the Payment Card Industry Data Security Standard, often referred to as PCI, can benefit even those companies not processing credit card transactions.
A government-adopted and enforced global benchmark for network security may lend value, and borrowing from the PCI DSS playbook could help in its creation.
Internet security vaulted into the spotlight as an early focal point for Prime Minister Stephen Harper's new government, on both the domestic and international fronts
Private equity investment firm Thoma Bravo has bought Tripwire, a year after the compliance maker had planned an IPO.
IT managers should consider the benefits of non-interoperable platforms, says AT&T's Ed Amoroso.
As part of a broad effort to better safeguard student privacy, the U.S. Department of Education hired its first ever chief privacy officer.
For many small and midsize businesses, neglecting IT security is a thing of the past, reports Angela Moscaritolo.
SC Magazine has recognized Scott Sysol of CUNA Mutual Group as CSO of the Year for his work around data privacy, risk reduction, enterprise-wide IT controls and tapeless backup.
This year, thanks to a renewed focus on the insider threat, the longings of the security professional may come to fruition.
Senate Republicans on Thursday shot down an attempt to repeal the military's "don't ask, don't tell" policy that bars gays from serving openly, likely the death knell to a bill that also would have brought major changes to the way the federal government handles information security. A U.S. Senate procedural vote on Thursday to continue debating the National Defense Authorization Act of 2011 failed to garner the 60 votes necessarily to move forward. The bill, passed by the House of Representatives in May, contains provisions to update to the Federal Information Security Management Act (FISMA) and establish a cybersecurity office within the Executive Office of the President. — AM
Lawyers, doctors and accountants may avoid having to comply with the Federal Trade Commission's new identity theft rule.
As more organizations continue migrating to the cloud, what should information leaders at organizations be asking of their provider?
Brokerage services provider Aon Corp. found help in streamlining its network operations throughout its global reach into 120 countries, reports Greg Masters.
The group responsible for managing payment security rules plans to release two new guidance documents early next month assessing the impact of emerging data security technologies on payment card security.
IBM on Wednesday announced that it has agreed to acquire Waltham, Mass.-based risk and compliance management software provider OpenPages for an undisclosed sum. In a news release, IBM said the acquisition will expand its ability to help businesses address risk management and compliance challenges. OpenPages, which will be integrated within IBM's Business Analytics software portfolio, offers solutions to assist organizations with internal audits, vendor risk management and IT risk and compliance management. The company has more than 200 clients, including Barclays, Duke Energy and Carnival Corp. — AM
Another IT security company was gobbled up by an IT bellwether when HP on Monday announced plans to acquire Cupertino, Calif.-based SIEM provider ArcSight for $1.5 billion.
Security professionals must consider all the options available to them to secure cardholder data.
Entitlement reporting can help organizations control risk and meet compliance mandates, while accounting for employee access.
The body that manages PCI guidelines has released a summary of expected changes, but merchants will not find any mention of emerging data security technologies.
SC Magazine Deputy Editor Dan Kaplan sits down with Tripwire's Michael Thelander to learn whether compliance remains a driver for organizations, especially as new regulations pop up and existing mandates become more stringent. Thelander also touches on compliance in the cloud, and whether it can be achieved.
IBM on Thursday announced plans to acquire BigFix, an Emeryville, Calif.-based provider of security management solutions. Specifically, BigFix software offers a single IT management platform that allows organizations the ability to manage applications for vulnerabilities, systems lifecycle, configuration and compliance. Terms of the deal were not disclosed, but a Bloomberg report valued the transaction at $400 million. IBM's last security-related acquisition was last fall when it picked up database security firm Guardium for a reported $225 million. — DK
Drivers such as compliance and insider threats are helping to keep information security budgets at financial institutions alive and well, according to a new study.
Leave behind technological baggage and build business, says Verdasys' Emeric Miszti.
The group responsible for managing payment security rules has released version 3.0 of the PIN Transaction Security (PTS) standard. The new version replaces the PIN Entry Device (PED) standard in an effort to streamline point-of-sale security guidelines to also cover unattended payment terminals, such as fuel dispensers, and hardware security modules, which are nonuser facing devices used in PIN translations. The update "simplifies the testing process and eliminates overlap of documentation," according to the PCI Security Standards Council. The council also plans to release updates to its Payment Application Data Security Standard and flagship PCI Data Security Standard later this year. — DK
The PCI Security Standards Council, tasked with managing the Payment Card Industry Data Security Standard (PCI DSS), on Friday announced a new training program designed to educate internal security personnel on conducting assessments. The three-day course, to be led by PCI Council experts, either will enable security departments to better work with with third-party assessors or allow them to conduct their own assessments, Bob Russo, the council's general manager, told SCMagazineUS.com. Merchants that process more that six million annual transactions are required to conduct annual on-site PCI DSS assessments. Classes will be held in multiple locations. For more information, including pricing, visit here. — DK
A new report from Forrester Research's consulting arm reveals that organizations are focusing too much on compliance and not nearly enough on protecting valuable proprietary information.
Join us Tuesday and Wednesday for our special two-day SC eConference and Expo: Complying with PCI.
A new privacy regulation in Massachusetts evokes anxiety for many, but getting in line may prove to be no big deal, reports Greg Masters.
Forty-one percent of merchants are relying on compensating controls to meet Payment Card Industry Data Security Standard (PCI DSS) requirements, according to a survey released Monday by the Ponemon Institute and commissioned by encryption firm Thales. The survey, which polled 155 qualified security security assessors, who are charged with confirming a company's adherence to PCI. Compensating controls "may be considered for most PCI DSS requirements when an entity cannot meet a requirement explicitly as stated, due to legitimate technical or documented business constraints," according to the PCI Security Standards Council. — DK
Data breaches involving privacy information continue to increase despite the costs, embarrassment and negative publicity associated with them.
Information security budgets will get a boost at many organizations in 2010, according to a study released Tuesday by IT research company TheInfoPro. The study, based on interviews of 259 security decision makers at Fortune 1000 and mid-size organizations, found that 40 percent of enterprises are planning to increase their 2010 security budgets. Data leakage prevention topped the list of projects planned for 2010, followed by identity management and compliance initiatives. — AM
In 2004 at the World Economic Forum, Bill Gates proclaimed: "Two years from now, spam will be solved." Six years later there is no indication that the spam problem will ever be solved. So what went wrong?