The UK government pledges at Infosecurity Europe to help businesses improve cybersecurity. But it's going to take more than vouchers and training to address Europe's top threats to security and privacy.
Distributed-denial-of-service attacks jumped significantly in 2012. And it's not just banking institutions that are victims, Verizon finds in its just-released Data Breach Investigations Report.
A new report by several GOP senators raises questions about the HITECH Act's electronic health record incentive program, including concerns about data security and privacy. But the senators overlook a number of key issues.
We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
Does legislation designed to get businesses and governments to share cyberthreat information provide adequate civil liberties protections? Find out what's at the heart of the debate.
To retain their customers after a breach of sensitive information, organizations should take the extra step of calling those affected to offer free credit protection services, says security expert Brian Dean.
The Boston Marathon tragedy is yet another reminder to organizations to develop alternative ways to communicate with employees during such emergencies. Otherwise, they could put their organizations' continuity plans at risk.
Global Payments Inc. says it has closed the door on the investigation into the breach it discovered in March 2012. The Atlanta-based processor explains steps it's taken to reinstate PCI compliance.
The U.S. Environmental Protection Agency's initial move to the cloud has focused on infrastructure services and productivity platforms, including moving 22,000 EPA e-mail users to the cloud.
The SEC in 2011 issued staff guidance on disclosure obligations regarding cyber-risks and incidents. Now, Senate Commerce Committee Chairman Jay Rockefeller wants the SEC commissioners themselves to provide the guidance.
The potential loss of experienced personnel could lead to a shortage of skilled employees and place a greater burden on the existing cybersecurity staff, as well as seriously affect the daily operations of the federal government.
For the second straight quarter, U.S. government statistics indicate that unemployment exists within the IT security profession. But even the government doesn't consider its numbers gospel.
A rider covertly added to the law to fund the government through September requires select agencies to assess technology purchases for cyber-espionage and sabotage, a process that could make it harder to buy wares to secure IT.
History shows that DDoS phase 3 may end soon, and banking institutions can expect an even more powerful 4th wave. "There is little reason for the attacks to cease," says Javelin's Al Pascual.
The FTC puts the onus on application developers to protect their organization's sensitive data by mandating the use of "reasonable" data security practices. What does this mandate mean in practice?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.