Encryption makes the contents of email, both the message text and any
attachments, indecipherable to unauthorized individuals. Encryption can be used
in transit, so that if an unauthorized individual outside the company intercepts an
email while it moves across the Internet it cannot be read. Encryption can...
The lead cybersecurity official for Britain's GCHQ intelligence agency dismisses charges that the U.K. conducts mass surveillance. But critics question the government's introduction of the Investigatory Powers Bill.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
Drawing on networking protocols designed to support NASA's interplanetary missions, two researchers have created a networking system that's designed to transmit information securely and reliably in even the worst conditions, such as in an Ebola hot zone.
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.
As organizations expand their use of encryption to help prevent breaches, they must improve their management of cryptographic keys, says Prakash Panjwani, senior vice president at SafeNet.
RSA 2014 is hosted across the street from a Target store. Which is only fitting because the Target retail breach arose in many discussions during day one of the annual security conference.
This 2012 Global Encryption Trends Report, based on the independent research by the Ponemon Institute, reveals that encryption continues to be viewed as a strategic issue and that organizations are increasing their investment in encryption across the enterprise in response to compliance regulations and...
When do you want to use tokenization over encryption? How do these two technologies help you address security issues, and which is suitable for compliance? How do you decide which is better? You'll find the answers in this independently researched white paper written by data security analyst firm Securosis which helps...
The Federal Reserve confirms it's been breached. What message does this attack send to banking institutions and their vendors about the heightened urgency to implement security best practices?
QCR Holdings, a bank-holding company in Illinois, is moving to a new provider for commercial online banking. Why? To ensure QCR's banks conform to the FFIEC's updated authentication guidance, says CTO Michael Wyffels.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Like most enterprises, you're deployed encryption broadly to protect information and authenticate systems. Yet what impact does poor encryption management have on your business? According to Aberdeen, poor key management practices are costing organizations millions in security and compliance-related incidents, and...
Visa's new end-to-end encryption service aims to eliminate payment card data at the merchant level. Eduardo Perez of Visa's Risk Group discusses the security value of this emerging solution.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing ffiec.bankinfosecurity.com, you agree to our use of cookies.