Fifty-four percent of respondents in The Global Study on the State of Payment Data Security, conducted by the Ponemon Institute on behalf of Gemalto, have had a security or data breach involving payment data an average of four times in the past two years.
A survey by the Pew Research Center found that 51% of Americans say Apple should assist the FBI in its efforts to unlock the iPhone belonging to Syed Rizwan Farook, one of the shooters.
The New York Police Department is testing software that uses neighborhood-specific data and past criminal activity to create statistical models that forecast where and when certain crimes are likely to occur.
While legislators have passed a multitude of statutes to aid in the protection of our economic interests pertaining to data systems – non-physical assets and privacy – frequently any course of action is still determined by the concept of monetary loss and treated as if someone was stealing or damaging physical assets, or as in the case of the Stored Communications Act (SCA), creating a statue that has been described as dense and confusing to even legal scholars.
Sally Beauty is reporting that a security break discovered on March 5 affected fewer than 25,000 credit and debit card accounts. The Denton, Texas-based seller of beauty supplies says it is pursuing its investigation with a forensics firm and the U.S. Secret Service.
On January 1, 2014, California implemented an amendment to its breach notification law. The law applies to companies doing business in California that experience a security breach exposing personal information.
In my previous article on PSIM ROI, I explained how organizations can use PSIM to achieve operational savings. In this second installment of my two-part series on PSIM ROI, I’ll explore a less obvious (hidden) PSIM ROI which can be achieved through better security.