The consensus from our panel of experts is that PCI DSS should be just one item on a far broader effort to integrate data security into enterprise risk management.
As a precaution, the ID theft protection service has removed the app from the App Store, Google Play, and Amazon Apps.
The Federal Trade Commission banned the retailer from misrepresenting its abidance in an international security framework
The agreement marks the largest HIPAA settlement to date.
Is there such a thing as an exchange of secure information in an insecure world?
A Texas-based company, Concentra, paid the HIPAA settlement stemming from a 2011 breach.
Introduced Tuesday, the Digital Privacy Act includes stiff penalties for organizations that fail to adequately respond to breaches.
Let's agree on a definition of the term "security" and move forward from there, says AT&T's Chris Mark.
The Federal Trade Commission has charged 12 companies with falsely claiming to comply with the U.S.-EU Safe Harbor Framework.
Information security personnel are challenged with protecting company reputation and enterprise and customer data from a constant and expanding barrage of cyber criminals.
GRC is at once the biggest pain point (arguably) of most large organizations and the most important task that does not usually get done right.
Version 3.0 of the PCI Data Security Standard (PCI DSS) and the Payment Application Data Security Standard (PA-DSS) became available today.
One issue with password systems has always been the 'reset' problem: what to do when a user forgets their password.
While already ubiquitous in much of the world, mobile payment options are gaining traction in the United States, reports Stephen Lawton.
So far, one solution, developed by European Payment Services, has been verified under PCI security standards for point-to-point encryption (P2PE) hardware.
In a perfect world, enterprises would know exactly when an auditor is going to show up, the questions they will ask, and data would be presented on a silver platter ready to prove the organization's compliance.
A major area of concern for security personnel these days is how we are able to achieve and maintain compliance with multiple regulatory governing bodies.
Business associates of HIPAA-covered entities are now legally bound to follow the same guidelines when securing patients' protected health information.
The promise of governance, risk and compliance technology is alluring, but getting it to work effectively is a different story, reports Alan Earls.
Robust enterprise security requires more than checking compliance boxes, says Diebold CSO Adam Williams.
There are a few key things every business should consider to truly improve data security.
The latest version of the payment security industry's data safeguarding standard should also include mandates and guidance around risk management, penetration testing and mobile.
Facebook has released its first-ever transparency report, a document breaking down the number of worldwide government requests for data on users. Not surprisingly, the U.S. is far and away the leader.
The council released a highlight of potential new requirements and guidance to the PCI Data Security Standard and Payment Application Data Security Standard, both due out in November.
To effectively mitigate mobile risk, organizations should employ the same content security capabilities, and ideally leverage the same content policies and rules in mobile environments.
The tentative list of incentives would entice companies to participate in the "Cyber Security Framework," a measure that aims to help the nation stave off industrial attacks.
To address today's threats, companies require a high degree of convergent perspective, information expertise, and coordination between personnel and groups.
An upcoming update of a credit card standard offers an opportunity to assess overall security, says Symcor's Della Shea. James Hale reports.
Finding each sensitive document and email in a massively growing data center is near impossible, but finding all of them requires a simpler strategy.
Most companies actually require only a small IT operational team, and can greatly reduce the costs associated with ensuring compliance and security.