FBI Director Robert Mueller says the bureau will apply the methods it uses to combat terrorism along with old-fashioned gumshoe practices such as infiltration of criminal networks to battle cybercriminals.
A consortium of eight major information technology companies is continuing development of a free framework designed to make it easier to exchange information about security vulnerabilities.
With the threat landscape significantly different since it issued its guidance four years ago, NIST sets out to revise Special Publication 800-61, Computer Security Incident Handling Guide, with help from industry, government agencies and academia.
No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
"I'll probably be hanged for this, but I really believe the cloud can be more secure than what we do today," says Tom Soderstrom, chief technology officer at NASA's Jet Propulsion Laboratory.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
"This is a unique program that fits the specific needs for upcoming and current IT security leaders and adds high enrichment to peer support and the learning experience," says Dena Haritos Tsamitis.
Concerns expressed by the National Security Agency director come at a time when Congress is split over the role government should perform in determining the security of the mostly privately owned national critical IT infrastructure.
A CEO's experience dealing with the aftermath of an information breach caused by the theft of an unencrypted laptop offers valuable lessons. Read about his real-world advice.
Data breaches tied to credit and debit cards accounted for more than 25% of all breaches in 2011. What must banking institutions and merchants do to help reverse this trend?
Data breaches are under-reported, and breached organizations aren't giving consumers the information they need about these compromises, says Karen Barney of the Identity Theft Resource Center.
Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
A California health system is notifying about 30,000 patients that their personal health information was accessible via search engines for about a year.
Getting forensics help should be one of the first steps an organization takes after a breach occurs, says IT security and privacy lawyer Miriam Wugmeister.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.