New building for German recycling systems supplier includes demonstration area.
Read the original here:
SiCon Moves to New Headquarters
Pennsylvania information security company to conduct seminar in Harrisburg.
Go here to see the original:
Reclamere to Host Data Security Event
At the PCI SSC Community Meeting last week, the biggest highlight was the presentation of a report the group sought from PricewaterhouseCoopers (PWC). The first presentation of the PWC report of PCI Emerging Technologies made it clear that by expanding the technological scope of PCI DSS, companies will be able to reduce the scope of their PCI compliance efforts. High priorities over the next year will be end-to-end encryption, tokenization and virtual terminals.
Go here to read the rest:
The Two Scenarios Coming From The Pwc Pci Report
Welcome to Identity Force’s newest service for our members – our weekly roundup of important identity theft and data breach news. Once a week we will e-mail you links to stories and information that will keep you up-to-date with the latest consumer tips, data breach announcements, scam alerts and legal developments.
View original post here:
Welcome to Identity Force’s Weekly News Alert
Interview with Bob Russo, GM of PCI Security Standards CouncilSince the announcement of the Heartland data breach in January, the merits of the Payment Card Industry Data Security Standard (PCI DSS) have been questioned, and Bob Russo has led the defense. Russo is general manager of the PCI Security Standards Council, the group responsible for the development, management, education and awareness of the PCI Security Standards. In an exclusive interview conducted at the council’s recent community meeting in Las Vegas, Russo discusses: Why end-to-end encryption is no security panacea; The merits of tokenization, Chip and PIN and other solutions; His response to breached entities that say they were PCI compliant.
See the original post:
Defending PCI: ‘Don’t Blame the Qsa’s’
Legal Insights on Data Privacy Trends and Breach ResponseYour organization has been breached – how should you immediately respond? How should you not respond
Read the rest here:
Privacy and the Law
Legal Insights on Data Privacy Trends and Breach ResponseYour organization has been breached – how should you immediately respond?
Privacy and the Law: Alysa Hutnik of Kelley Drye
Data Loss Prevention (DLP) has made it to the top spot of the worldwide TheInfoPro™ Information Security priority list. In certain countries across the globe, the key driver for this is mandatory data breach disclosure laws that impose fines on non-compliant companies.
Protection is ALWAYS better than cure
The women were participating in a mammography study conducted by the UNC School of Medicine. The breach could date as far back as 2007, and has exposed Social Security numbers, dates of birth and other sensitive information on the study participants, according to a report in the Charlotte, NC-based The News & Observer.
Follow this link:
University data breach exposes 163,000 women to identity theft
According to a recent Computing Technology Industry Association (CompTIA) survey, although most respondents still consider viruses and malware the top security threat, more than half (53 percent) attributed their data breaches to human error, presenting another dimension to the rising concern about insider threats.
Read more from the original source:
Five Best Practices for Mitigating Insider Breaches