The Office of Personnel Management data breach is merely a symptom of a much larger problem across all federal government executive branch agencies, and it's not going away anytime soon.
Updating the slow-moving Mutual Legal Assistance Treaty process is critical to bringing cyber law enforcement into the 21st century. That's why Congress needs to take prompt action.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
While the terms "cybersecurity" and "information security" are used interchangeably, we may be fast approaching a point where a clear distinction is required to properly address emerging challenges.
Healthcare organizations and their business associates need to make three important resolutions in 2015 to better safeguard patient data and avoid the enforcement wrath of regulators.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
More organizations are looking to "continuous security" to monitor their ever-expanding network perimeters. But what are the critical elements of effectively using this approach?
You need to combine IT security knowledge with business acumen if you want to find yourself among the ranks of chief information officers and other high-level positions. Here's how privacy can help.
PeaceHealth, a healthcare system in the Pacific Northwest, has devised a practical way to apply the NIST Cybersecurity Framework to its breach prevention efforts. Learn about the steps involved.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
Many business leaders lack a clear understanding of the value of identity and access management. CISO Christopher Paidhrin offers a scenario for how to make the case for an IAM investment.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.