Mobile security is no longer about managing devices, says Ian McWilton of Moka5. The real trick is to secure corporate assets through containerization solutions that reduce costs and improve user experience.
The partial takedown of ZeroAccess, one of the world's largest botnets, is an example of the role that collaboration between business and law enforcement can play in battling cybercrime.
The theft of 2 million credentials reminds security professionals that their organizations are at risk because many employees use the same passwords and devices for personal and business purposes, data security lawyer Ronald Raether says.
The IRS system that would allow eligible taxpayers to use refunds to help pay for health insurance under the Affordable Care Act wasn't built to detect fraud, a just-issued audit reveals.
As security leaders continue to have a growing influence with C-suite executives and boards of directors, they need to overcome communication challenges, says IBM's David Jarvis.
The Department of Health and Human Services should make several revisions in its plans for a revamp of the HIPAA accounting of disclosures rule and conduct pilot tests before implementing a final rule, an advisory panel recommends.
Hackers have pilfered some 2 million user passwords and credentials for Facebook and other social media and Internet sites, according to IT security provider Trustwave. The hackers attacked computers in about 100 nations.
Chase says hackers compromised servers for the bank's UCard Center website for prepaid card accountholders, potentially exposing card numbers. The bank is not reissuing cards, but it's offering free credit monitoring.
The latest FISMA audit of the Department of Homeland Security furnishes fodder for both sides of the argument over whether Congress should codify Obama administration actions that have granted DHS sway over other federal civilian agencies.
The privacy and security risks posed by the Internet of Things will pose a growing challenge for IT security professionals who manage online transactions and relationships, says ISACA's Robert Stroud.
Akamai's acquisition of DDoS mitigation provider Prolexic Technologies is a sign of how the DDoS-defense marketplace is maturing at a time when attacks are becoming more sophisticated.
A new takeover scam that the FBI calls a "man-in-the-e-mail" attack has drained $1.65 million from three Seattle-area businesses' accounts. Learn what steps to take to avoid becoming the next victim.
Can the two most feared nations in cyberspace finally come to an agreement to stop hacking each other and stealing confidential data? Here's one peace-making approach worthy of consideration.
Obama administration officials say hundreds of technical issues have been ironed out of the federal HealthCare.gov site, but have all of the security concerns been adequately addressed and tested?
You can be outraged that the NSA collects Internet communications records of U.S. citizens. But don't be surprised, says sociologist William Staples. This is just one example of our "culture of surveillance."
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.