From mobile and the cloud to DDoS attacks and risks surrounding big data, what should banks and credit unions do now to mitigate exposure? Gartner's Anton Chuvakin offers his top recommendations.
Supply chain risks can occur when organizations purchase and implement information and communications technology products and services. See 10 ways to diminish these risks.
Organizations are urged to adopt six principles to avoid the perils of transferring IT decision making away from technology specialists to business unit leaders.
"As an employee of a local government information security organization ... I implore you to consider a new approach to our joint efforts to secure information infrastructure."
Cloud computing gives the jitters to those charged with protecting their organization's IT assets. To gauge the concerns of security professionals about cloud computing, we're fielding a global survey covering all industries. We want to know your views.
FedRAMP will ensure that cloud-based services have adequate information security, eliminate duplication of effort and reduce risk management costs and enable rapid and cost-effective procurement of IT systems and services for federal agencies.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
Verisign Inc. may have followed the letter of the law when revealing a series of breaches in an SEC filing. But the company that assures the flow of a hefty portion of Internet traffic should have been more forthright to ease the minds of its various constituencies.
The controls create a baseline to properly address the unique elements of authorizing cloud products and services, including multi-tenancy, control of an infrastructure and shared resource pooling, Homeland Security CIO Richard Spires says.
John Carlson sees the evolution of technology introducing new threats to financial institutions. So, how will BITS' new VP of cybersecurity and fraud prevention help banks mitigate those risks?
While organizations need to make investments in data protection and storage, it's crucial that they first get a real handle on classifying their data before allocating resources in the wrong places.
Veterans Affairs may have been biased when it awarded last year a high-bid, $133 million IT security services contract to the incumbent provider, the consultancy Booz Allen Hamilton, a VA inspector general audit contends.
Having a breach response team in place at your organization is a necessity in today's threat environment. But how - before a breach occurs - do you know if your team is truly effective?
Federal CIO Steven VanRoekel issues a memorandum ordering agency and departmental CIOs to use the new Federal Risk and Authorization Management Program to assess, authorize, procure and continuously monitor cloud computing offerings.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.