Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
A report released by Gov. Nikki Haley says the hacker obtained the password when an employee of the Department of Revenue opened an e-mail containing malicious computer code.
The goal is admirable: Eliminate all traces of online information about an individual if that's what he or she wants. But is the right to be forgotten an impossible dream?
As missiles and bombs do real damage in Israel and Gaza, a veteran Israeli cybersecurity expert, Amichai Shulman, downplays the significance of the assaults waged against Israeli websites, contending any damage has been minimal.
Webster Bank and Zions have confirmed online outages that resulted from distributed-denial-of-service attacks. But is the hacktivist group Izz ad-Din al-Qassam behind the attacks?
NASA is ramping up efforts to encrypt all laptops following the recent theft of one containing sensitive personal information. Find out more about the U.S. space agency's encryption plans.
It's been nearly a month since the latest DDoS attack against a U.S. banking institution. What do the hacktivists say? Are the attacks over, or can we expect to see a new round of assaults?
As seen on YouTube, South Carolina Gov. Nikki Haley, more than any other chief executive, in or out of government, is out front leading the response to a breach of its tax system. It's been an education for the governor as well as South Carolinians.
Incorporating new concepts such as security-control overlays and placing a renewed emphasis on information assurance, the forthcoming guidance is 'a total rewrite' from the 2009 version, NIST's Ron Ross says.
To know how best to respond to IT and communications failures, incident response pros first must collect information on such incidents, says Marnix Dekker, who co-authored a new report for ENISA.
Leaders at four security technology companies say the recent distributed-denial-of-service attacks against 10 U.S. banks highlight the need for new approaches to preventing and responding to online outages.
To know how best to respond to IT and communications failures, organizations first must collect information on such incidents, says Marnix Dekker, who co-authored a just-issued report on incidents for ENISA.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
If President Obama's second term were a movie sequel, I'd call it "Unfinished Business." It's time to step up and see through the cybersecurity initiatives Obama spoke about when he first took office.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.