As of January 1, 2018, all SWIFT customers had a deadline to self-attest to their compliance with the new SWIFT Customer Security Program (CSP), designed to respond to the wave of cybercrime that began with the Bank of Bangladesh breach back in February, 2016 and has swept across the world over the past two years. If...
Deployed at the network layer, segmentation was first developed to improve network performance. But as cybersecurity experts have realized that a "perimeter only" approach to security is not working, it has become increasingly clear the micro-segmentation is foundational to data center and cloud security. ...
The explosive growth of IP networking has let a genie out of the bottle. The more an organization or nation is connected to the internet, the more vulnerable it becomes. The challenge is finding the right balance between "can" and "should" - the fact that we can connect every person, server, app, and cloud vs. the...
Look at information security through the lens of business risk, and you'll begin to make decisions about security in light of their impact on the business. With security threats emerging faster than ever, what if your most important information is not protected? What strategic business advantage do you gain if it is...
As if being a prime target for data breaches wasn't enough, complex and ever-changing regulations and standards in the financial services industry make securing, managing and controlling access to applications and data a strategic priority.
At the same time, exceptional user experiences are no longer just a...
Consumers have more healthcare choices than ever, meaning payers and providers have more competition as well. Many are differentiating themselves in the marketplace by adding health tracking apps and integrating with partners to display prescription, billing and appointment .
Your patients and members are today's...
Experian is transforming from a credit reporting agency to a customer-driven data services company, and at the heart of all its services lies the need for secure, user-friendly authentication at every stage of the employee and customer experience. That's no small task, and they had to start with an established...
If you're paying attention, you've probably already seen a handful of GDPR-related headlines just today, let alone in the last week or month. But there are two good reasons for the deluge of GDPR discussion right now: It's incredibly important and the time to act is now.
There is a lot to say about the disorganized way most cyber incident claims are currently handled. Instead, adopting a project management approach will make better use of resources and lead to several benefits.
To this point, many incidents have traditionally been handled with a "lawyer-heavy" approach, but the...
Today's customers expect consistent, seamless retail experiences — online, in store and through mobile apps. For retailers to remain competitive in a digital environment, they must revolutionize the way they operate to meet these demands while providing a personalized, secure customer experience at every point...
The Open Banking mandate in the United Kingdom and the second Payment Services Directive (PSD2) regulation in the EU are meant to increase competition and innovation in the financial system. They come into force in early 2018 and will set new standards for banks in the areas of strong customer authentication, secure...
Banking and financial services customers today expect friction-free experiences no matter what device they're on, and regardless of whether they're at work, at home, or on the road. To succeed in the new digital era, it's critically important that you deliver seamless, personalized and omnichannel experiences for your...
Time is running out. You've heard that costly penalties will be assessed for companies that have been slow to comply with GDPR in late May of 2018. But GDPR should not be viewed as only 'another regulation'. Coming to compliance with GDPR is an opportunity to build trust with consumers as it lays out the privacy...
Eduard Goodman, global privacy officer of CyberScout, doesn't like the disorganized way most cyber incidents are handled now. Instead, he would like to see a more project management approach. Here are the benefits he foresees.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing omnibus.healthcareinfosecurity.com, you agree to our use of cookies.