"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
One of the most important ways to prevent breaches is to make widespread use of encryption, especially for mobile devices and media, says security expert Melodi Mosley Gates. Here are few practical tips for leaders.
RSA Conference 2012 opens Feb. 27 in San Francisco, and for the third straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda at this world-class security event?
Nortel Networks Ltd. has been the victim of a hacking campaign for more than a decade. The campaign gave attackers access to the corporate computer network and sensitive company information, according to news reports.
Cloud computing gives the jitters to those charged with protecting their organization's IT assets. To gauge the concerns of security professionals about cloud computing, we're fielding a global survey covering all industries. We want to know your views.
The recent major breach at Zappos.com should lead security professionals in all industries to carefully review how much client information their organization really needs to store, security expert Fred Cate says.