Imagine sitting in a bar, as a stranger snaps a photo of you, and then uses that image to find out who you are using facial recognition technology. It's the type of practice that the staff of the U.S. Federal Trade Commission wants to discourage.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
"A cyberattack perpetrated by nation states or violent extremists' groups could be as destructive as the terrorist attack on 9/11," U.S. Defense Secretary Leon Panetta says. "Such a destructive cyber-terrorist attack could virtually paralyze the nation."
Employment of IT security professionals in the United States is at an all-time high, our analysis of the latest U.S. government jobs data shows, but the growth in the profession isn't keeping pace with the demand for these skills in business and government.
Delaware state information security officers recently convened for a day of meetings and training to better prepare for incidents in their individual agencies, an event state CSO Elayne Starkey compares to fire drills.
Nearly five years after announcing a competition to develop a new cryptographic hash algorithm, the National Institute of Standards and Technology announces a winner that was designed by a team of European scientists.
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
The new report aims to help access-control experts improve their evaluation of the highest security access-control systems by discussing the administration, enforcement, performance and support properties of mechanisms that are embedded in each system.