As social media continue to expand and evolve, organizations need to formalize a policy to address the risks. Expert Sherrie Madia details the must-haves that should be included in a policy.
As seen on YouTube, South Carolina Gov. Nikki Haley, more than any other chief executive, in or out of government, is out front leading the response to a breach of its tax system. It's been an education for the governor as well as South Carolinians.
Despite numerous data breaches, as well as financial incentives and penalties, many healthcare organizations aren't taking risk assessment requirements seriously. Experts offer insights on best practices.
Social media platforms are ever-evolving. But organizations' and individuals' use of social media has not evolved and may create new risks, says educator Sherrie Madia. How should we manage these risks?
A California law requires each of some 120 state agencies to have an information security officer, but not every agency ISO is well-versed in IT security.
DDoS attacks against U.S. banking institutions have exposed website vulnerabilities organizations have failed to address, says Jason Malo of CEB TowerGroup. Here, Malo offers defense strategies.
Cybersecurity thought-leader Ira Winkler has just been named ISSA's new international president. One of his first tasks is overseeing the start of two new special interest groups. What is their mission?
Top Department of Homeland Security officials, including Secretary Janet Napolitano and Deputy Undersecretary Mark Weatherford, are emphasizing the need for the department to increase its IT security workforce and skills.
Organizations everywhere should be concerned about DDoS attacks. But most are too focused on compliance to pay enough attention to fraud and security fundamentals, says ENISA's John Walker.
Defending Delaware's critical infrastructure is a top challenge since a large part is owned by the private sector, says State Homeland Security Adviser Kurt Reuther, who details the challenges.
BITS, the technology division of the Financial Services Roundtable, says DDoS attacks on banking institutions are likely to continue and offers a seven-point strategy for preparation and response.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
Lost and stolen unencrypted mobile devices are reoccurring culprits in data breaches. So why isn't the use of encryption more widespread? And how are organizations ramping up mobile security?
Delaware Chief Security Officer Elayne Starkey leads, but does not supervise, hundreds of information security officers, many of whom have technical expertise in areas other than security.
Banks struck by the wave of DDoS attacks are communicating badly and missing a great opportunity to educate their customers about cybersecurity, says Gregory Nowak of the Information Security Forum.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.