David Sherry, CISO of Brown University, sees the security leadership role transitioning completely to risk and governance over the next few years. What challenges will leaders face along the way?
As missiles and bombs do real damage in Israel and Gaza, a veteran Israeli cybersecurity expert, Amichai Shulman, downplays the significance of the assaults waged against Israeli websites, contending any damage has been minimal.
An executive at a bank in New Jersey that was battered by Hurricane Sandy offers lessons learned, including the importance of having a well-tested, detailed business continuity plan.
Webster Bank and Zions have confirmed online outages that resulted from distributed-denial-of-service attacks. But is the hacktivist group Izz ad-Din al-Qassam behind the attacks?
More than half of U.S. Department of Energy desktop systems tested by the inspector general failed to apply security patches for known vulnerabilities, though the software fixes were issued months earlier.
It's been nearly a month since the latest DDoS attack against a U.S. banking institution. What do the hacktivists say? Are the attacks over, or can we expect to see a new round of assaults?
As seen on YouTube, South Carolina Gov. Nikki Haley, more than any other chief executive, in or out of government, is out front leading the response to a breach of its tax system. It's been an education for the governor as well as South Carolinians.
New malware attacks are targeting smart phones, and experts say banking institutions aren't doing enough to detect and prevent those attacks. So where should institutions focus their tech investments in 2013?
NIST issues its interagency report on supply chain practices as a congressional panel cautions against using Chinese-made components that some lawmakers fear might have been altered to spy on Western governments and businesses.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Post-Superstorm Sandy, as security pros prepare for disasters, they must consider the integrity and availability of data - an often overlooked business continuity element, says Alan Berman of DRI.
"It's clear we need some statewide mechanism in order to coordinate and address these issues," Inspector General Patrick Maley says. "Somebody has to be in charge."
President Obama has signed a classified presidential directive that reportedly enables the military to act more aggressively to frustrate cyberattacks on government and private computer networks.
For the second time in three months, the Senate on Nov. 14 failed to muster the 60 votes needed to halt a filibuster of the Cybersecurity Act of 2012. The vote was 51-47.
Incorporating new concepts such as security-control overlays and placing a renewed emphasis on information assurance, the forthcoming guidance is 'a total rewrite' from the 2009 version, NIST's Ron Ross says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.