The Latest News

  • 5 Problems Vex Federal InfoSec Hiring

    Solutions Posed to Close the Cybersecurity Talent Gap 5 Problems Vex Federal InfoSec Hiring

    A new Partnership for Public Service report explains why the federal government faces a slew of problems in hiring and retaining IT security professionals. It also proposes initiatives to boost the government's cybersecurity workforce. Read more...

  • How to Fight a Surge in Phishing

    CISO Describes Efforts to Thwart External Threats How to Fight a Surge in Phishing
    Heather Roszkowski

    Over the last six months, the University of Vermont Medical Center has seen a spike in phishing attempts, including those laced with malware in an attempt to steal credentials, says CISO Heather Roszkowski, who describes her defensive efforts. Read more...

  • InfoSec Workforce Continues to Grow

    34 Percent Increase in the First Quarter InfoSec Workforce Continues to Grow

    In the first three months of 2015, the number of information security analysts in the United States grew at a much stronger pace than other occupations within the information technology sector. Read more...

  • Talking Security to the Board

    Do's and Don'ts from Jim Anderson of BAE Systems Talking Security to the Board
    Jim Anderson, BAE Systems Applied Intelligence

    We all know that breaches and cybersecurity are topics of boardroom discussion. But how should security leaders present them to their boards? Jim Anderson of BAE Systems Applied Intelligence offers tips. Read more...

  • BitSight CEO on Nation-State Attacks

    Shaun McConnon Says Security Preparedness Falls Short BitSight CEO on Nation-State Attacks
    Shaun McConnon

    The advanced and persistent nature of today's cyber-attacks, which are often waged by nation-states, is changing the way organizations address network security, says BitSight CEO Shaun McConnon. Read more...

  • Interview

    PCI DSS Version 3.1 - What's New?

    Troy Leach of PCI Council Explains New Version of Standard By Tom Field
    PCI DSS Version 3.1 - What's New?

    The PCI Council has just released PCI DSS 3.1, which calls for mothballing the SSL encryption protocol. What do security leaders need to know about the revised standard? Troy Leach of the council offers insights.

  • Interview

    Framework for a New ID Ecosystem

    Draft of Model to Be Previewed at RSA Conference 2015 By Tom Field
    Framework for a New ID Ecosystem

    What is the Identity Ecosystem Framework, and why is it so important for security professionals to embrace? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.

  • Article

    National Breach Notice Bill Advances

    Measure Would Pre-empt State Breach Notification Laws By Eric Chabrow
    National Breach Notice Bill Advances

    A House committee approved on April 15 a national data breach notification bill, but the committee chairman concedes that the legislation isn't quite ready for a vote by the full House of Representatives.

  • Article

    House Panel Passes Info Sharing Bill

    Democratic Attempts to Limit Liability Safeguards Fail By Eric Chabrow
    House Panel Passes Info Sharing Bill

    After beating back amendments by Democratic members to limit liability protections for businesses, the House Homeland Security Committee on April 14 unanimously approved cyberthreat information sharing legislation on a voice vote.

  • Article

    Apple Systems Vulnerable to Bug

    Kaspersky Reports 'Darwin Nuke' Affects OS X, iOS By Varun Haran
    Apple Systems Vulnerable to Bug

    Researchers at Kaspersky Lab have released information on a denial-of-service bug, dubbed "Darwin Nuke," found in Apple's operating systems. Security experts weigh in with recommendations.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Breach Prevention: 5 Lessons Learned

As organizations set their 2015 priorities for security defenses and breach prevention, they should...

Latest Tweets and Mentions

ARTICLE Breach Prevention: 5 Lessons Learned

As organizations set their 2015 priorities for security defenses and breach prevention, they should...

The ISMG Network