article thumbnail

Mastercard preps for the post-quantum cybersecurity threat

CIO Business Intelligence

Other enterprises in the financial sector are also exploring QKD. Not many hardware vendors have features available that can integrate with the QKD systems.” Transaction security and the trust of our customers are the backbone of our business,” Maddaloni points out. CIO 100, Data and Information Security, Quantum Computing

Financial 138
article thumbnail

Breaking Down User Activity Monitoring Tools: Security and HR Perspectives

SecureWorld News

In terms of computer system event monitoring, UAM tools can track software registry changes, hardware usage, port activity, and program and external IP access. From an information security department's perspective, the more data collected on employee actions, the more effectively potential incidents can be investigated.

Tools 102
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Tech Moves: Adriane Brown joins KKR board; AI2 adds HR exec; Ossia and LevelTen hire CFOs; more

GeekWire

F5 Networks named Equinix Chief Information Security Officer and Microsoft alum Michael Montoya to its board of directors. Prior to joining Equinix, he was SVP and chief information security officer at Digital Realty. Absolute Software recently acquired Seattle-based security startup NetMotion for $340 million.

Energy 114
article thumbnail

The Endpoint Imperative: Global Security Compliance. Are you ready?

Cloud Musings

Tune into this episode of “ The End Point Imperative: A Podcast Series from Intel ,” to hear from Intel’s Yasser Rasheed , Director of Business Client Security on how a combination of protection at the hardware and software level can help organizations gain compliance and avoid breaches, fines, and financial impact.

article thumbnail

Quantum Computing: A Looming Threat to Organizations and Nation States

SecureWorld News

Director of Information Security, State of Colorado Governor's Office of Information Technology; and Toby Zimmerer, Sr. As for the panel presentation at SecureWorld Denver , it features Edgar Acosta, Experienced Cybersecurity Professional (former CISO at DCP Midstream ); Craig Hurter, Sr. Demand and Delivery Director, Optiv.

article thumbnail

You’re not alone in the cyber battlefield

Dataconomy

ISO 27001 is an internationally recognized standard for information security management. It provides a framework for organizations to manage and protect their sensitive information, including financial data, customer details, and intellectual property. What is ISO 27001?

article thumbnail

Averting turbulence in the air

CIO Business Intelligence

Understanding the PCI DSS Standard PCI DSS is an information security standard designed to ensure companies that process card payments maintain a secure IT environment for their customers. Data and Information Security The PCI DSS v4.0, But what if they do not store any cardholder data? PCI DSS v4.0