Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
Detecting and investigating complex fraud schemes requires a deeper understanding of the relationship between actors, events and entities. This dynamic webinar will reveal how new technology is proactively exposing fraud rings' biggest vulnerabilities: shared identity information. Attendees will learn how...
It's not quite the cyberwar many have envisioned, but the United States and China are tangled in a brawl that resembles, in some respects, a combination of a trade war and cyber-sniping.
Hacker Hector Monsegur, also known as "Sabu," has been sentenced to time served because he aided the government in preventing or mitigating more than 300 cyber-attacks, including those against the U.S. Congress, Visa and MasterCard.
French IT services company Atos has announced its intention to purchase Bull, an enterprise data firm, to enhance its cybersecurity and big data offerings. The deal is worth $844 million, or 620 million euros.
CEOs should become more involved in breach preparedness and response because of the financial consequences a breach could have on the enterprise, says Ponemon Institute Chairman Larry Ponemon.
In the more than a month since the Heartbleed bug was announced, many organizations have made progress in mitigating the risks. Security experts highlight gaps that remain and offer remediation advice.
Sen. Mary Landrieu, facing a tough re-election campaign, is turning her position on a bill to strengthen DHS's cybersecurity workforce into campaign fodder to highlight her anti-Washington credentials with voters.
Users spend, on average, 82 percent of their mobile minutes with apps and just 18 percent with web browsers. It's the lean, restricted functionality of mobile apps that makes them both convenient and task-oriented - and a major reason why they're so attractive to consumers and businesses. But mobile app development...
None of the executive branch agencies that have regulatory authority over critical infrastructure operators will impose new cybersecurity rules on the industries they regulate, according to White House Cybersecurity Coordinator Michael Daniel.
The Government Accountability Office has confirmed it will conduct "complete and continuous end-to-end testing" of the security of the Obamacare HealthCare.gov website and systems.
Supporters of a stronger version of the USA Freedom Act pin their hopes on the Senate after the House overwhelmingly approved a watered-down version of the measure aimed at curtailing the government's collection of American's phone records.
Today's sophisticated attackers use ever-stealthier malware and zero-day exploits to evade traditional security defenses, making organizations increasingly vulnerable to advanced persistent threats. These APTs seek to exfiltrate critical data over the long term. So, what are the most effective strategies and solutions...
A bill designed to help strengthen the cybersecurity workforce at the Department of Homeland Security is headed to the Senate floor, although supporters of the measure say obstacles to passage still must be overcome.
Much to the annoyance of civil libertarians, the White House has backed a revision to the USA Freedom Act that is seen as watering down the legislation aimed at curtailing the government's bulk data collection program.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.