Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
Most organizations today have breach response plans. But far too few test these plans before an incident occurs. Experts Michael Bruemmer and Ronald Raether discuss the essentials of breach response.
A refrigeration vendor serving Target Corp. acknowledges it was breached. Earlier, Target had confirmed its massive breach was the result of credentials stolen from one of its vendors.
A new identity fraud study shows that consumers who are victims of a payment card breach are at greater risk of fraud than victims of other types of breaches, says Al Pascual of Javelin.
In the past few months, the "Internet of Things" has gained more attention, and the cybersecurity and privacy implications are only beginning to be addressed in many quarters.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
Bipartisanship - a rare commodity on Capitol Hill - manifested itself with the House Homeland Security Committee's approval of a bill aimed to help buttress the cybersecurity of the nation's critical infrastructure.
Leading this week's roundup, HP published its annual Cyber Risk Report for 2013, identifying top vulnerabilities and providing analysis of the threatscape. See additional news from Microsoft, Symantec and more.
Encryption gaps in retail payment card transactions were highlighted at a Congressional hearing that examined security failures in the aftermath of malware attacks against point-of-sale systems at Target and Neiman Marcus.
When breaches result from retailers' lax security practices, merchants should be obligated to help banking institutions cover fraud losses and other post-breach expenses, says Viveca Ware of the Independent Community Bankers of America.
RSA 2014 will offer many insights on how banking institutions can address a wide variety of security threats. Here's a guide to educational opportunities.
Covered entities and business associates will be under heightened data privacy and security scrutiny in 2014. But experts say there are several basic steps those organizations can take to ensure HIPAA compliance.
Data loss prevention is more important now than ever before. Targeted attacks increased by 42 percent in 2012, with an average of 8,350 identities lost per breach. Watch this 5-minute video from Symantec to understand how a DLP solution may impact your organization.
As the U.S. federal government tightens procedures to prevent Edward Snowden-type insider leaks, agency leaders are discovering that implementing well-thought-out plans isn't easy.
Whether it's your first time at the show or you're returning to the RSA Conference, Committee Chair Hugh Thompson offers tips on how to leverage your time during this world-class security event.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.