The Payment Card Industry Data Security Standard (PCI DSS) is the security standard for protecting payment card data. Navigating the requirements of the PCI DSS and implementing the technical security controls can be quite complicated.
Recent developments in the cybersecurity sphere read like a dystopian novel. The devices we use for convenience and entertainment in our homes are being taken over for malicious purposes by forces unknown.
Combatting drug trafficking at ports, screening passengers at airports, determining the age of immigrants who have lost their passports: these are among the areas where radiation is used for human imaging for non-medical purposes.
Hardly a week goes by without a new hack or cyber breach being reported in the news, and companies are spending lot of time and attention in improving their IT security. But as companies set out to “raise their game” in protecting their confidential information from cyberattacks, it is important to understand and act on the fact that cybersecurity is not just a technology issue.
At the 2016 AAAE (American Association of Airport Executives) Airport Credentialing and Access Control Conference in Atlanta, Georgia, discussions centered around the rapidly evolving aviation security landscape, specifically with regard to renewed federal priorities on employee vetting and employee access control at airports.
The risk of payment card fraud is real, driven by the momentum of eCommerce and its cashless consumerism, reliant on payment cards to perform so many transactions. However, the incidence of payment card fraud is expected to change.
Risks to energy sector enterprises continue to grow, with drones, terrorism and budgetary challenges looming. Compliance requirements are tightening as well, but as Everardo Trujillo, Manager of Information Security Engineering and Operations at Sempra Energy Utilities, says: “A lot of people say ‘compliance makes you secure,’ and it’s the other way around, really.”
Edward Snowden may have the reputation as the most infamous insider threat in recent history, but he’s not the only one who used his job and company resources to commit a crime. Learn why insider threat programs are necessary to allow the organization to prevent, detect, respond to and deter insider threats. Also in this issue: how security professionals can prevent workplace bullying, how mass notification is becoming part of the essential infrastructure of enterprises, and much more!