What are the common mistakes individuals in organizations make when it comes to data security and breaches? Craig Spiezle of the Online Trust Alliance provides insight from the latest research.
The bad guys who attack information systems are getting better at what they do, making old threats even more dangerous, says Steve Durbin of the Information Security Forum.
Understanding big data is not the problem, say Michael Fowkes and Aaron Caldiero of Zions Bank. Figuring out how to use the information contained within big data in a meaningful way - that's the trick.
TD Bank and Keybank confirm that their online-banking sites were hit by DDoS strikes last week. And one security expert says other banks were hit by sophisticated attacks as well.
What's the cost to an organization when it suffers a seurity breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
Venafi has just partnered with Ponemon Group to release a new survey, "The Cost of Failed Trust". Among the key...
Want to know how predictive analysis could work to defend your IT systems? Take a look at how American Navy SEALS found Osama bin Laden, says Booz Allen Hamilton's Christopher Ling.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
The main takeaway from a House hearing this past week was that the biggest information security problem most small business operators face is that they're unaware they have an IT security problem.
A bill to reform the Federal Information Security Management Act, which is heading to the House of Representatives, delineates the responsibilities for each agency's chief information security officer. Read what they are.
DDoS experts say three online game sites have been hit by Brobot, the massive botnet that since mid-September has been used by hacktivists to attack leading U.S. banks. What do these attacks signal?
The latest report to Congress on the implementation of the Federal Information Security Management Act runs 68 pages. But even after reading the entire report, don't be surprised if you can't tell if government IT systems are secure. Here's why.
A rapidly evolving threat landscape calls for the next generation of information security professionals to have strong technical and communications skills. Security leaders highlight their top requirements.
The attackers' so-called Brobot, which on March 12 struck six banks, is growing, experts say. Yet only a fraction of the botnet's capabilities has been used. What else do the latest attacks reveal?
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
The bill's chief sponsor says agencies struggle with cyberthreats. "This update to FISMA will incorporate the last decade of technological innovation, while also addressing FISMA shortcomings realized over the past years." Rep. Darrell Issa says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.