Access your Pro+ Content below.
Another call for federal data privacy laws
This article is part of the May 2014 Vol. 16 / No. 4 issue of Information Security magazine
The fallout from major data breaches has pushed various members of Congress to propose yet another batch of data breach notification bills. Many of these proposed pieces of legislation simply recycle iterations of the bills introduced in earlier congressional sessions. Others contain a few new twists, but it comes down to a question of whether or not Congress can rally around at least one bill and pass federal data breach notification. Recent events may provide the impetus needed to get such a bill over the finish line. The Target breach has led to a number of different stakeholders calling for change in the form of federal legislation. Why now, you might ask? Many people agree that PCI DSS arose as a result of the credit card industry wanting to avoid federal regulation. For starters, the Target breach exposed over 70 million credit cards. While not the largest data breach in history (the NASDAQ breach discovered in 2007 exposed over 160 million credit and debit cards), many consumers shop at Target and place trust in the ...
Access this Pro+ Content for Free!
Features in this issue
This Beyond the Page explores the evolution of two-factor authentication and a range of emerging FIDO-ready technologies.
Will open FIDO standards for better interoperability of next-generation authentication technologies actually work?
The patchwork of state laws has not slowed epic data breaches. Will we see federal data breach notification laws in 2015?
In the wake of the Target breach, many companies still don't have a dedicated CISO.
Columns in this issue
Can the technology industry solve cybersecurity and data protection issues without federal legislation?
Are critics of the penetration test wrong? Find out what breaking and entering your enterprise network can reveal about the state of your security.
APT gives new meaning to targeted attacks that often rely on low-tech tactics and flawed network security.