The Latest News

  • Bit9 CEO on Data Breach Defense

    Businesses Must Assume Attackers Will Access Systems Bit9 CEO on Data Breach Defense
    Patrick Morley, president and CEO of Bit9 + Carbon Black

    The CEO of Bit9 speaks from experience: His firm was hacked, sensitive data stolen and customers put at risk. And what's happened since represents his mission to fend off attackers, even as they refine their hacks. Read more...

  • Consolidating IT as a Security Measure

    Minnesota CISO Chris Buse Describes State's Strategy Consolidating IT as a Security Measure
    Chris Buse, Minnesota state government CISO

    Chris Buse, CISO for the state of Minnesota, says centralizing IT systems should make it easier to defend against cyber-attacks because there are fewer computing environments to protect. Read more...

  • (ISC)², Schools Team Up on Training

    GAP Program to Develop Pros in India, Japan and Australia (ISC)², Schools Team Up on Training
    Clayton Jones of (ISC)²

    The Hong Kong regional headquarters of (ISC)² is collaborating with universities across Asia through its Global Academic Program to deliver essential skills to help grow the information security workforce. Read more...

  • Obama Grapples with Cyber Challenges

    Signs Executive Order, Cites Need for Collaboration Obama Grapples with Cyber Challenges
    President Obama signs executive order.

    In a Feb. 13 keynote speech at a cybersecurity summit, President Obama described the cyberworld as the "wild, wild West" and the American government as the sheriff. Then he signed an executive order aimed at boosting cyberthreat information sharing. Read more...

  • 'CIO of Year' on Defending Against Hackers

    University of Michigan's Schade Spells Out Security Priorities 'CIO of Year' on Defending Against Hackers
    Sue Schade

    What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers. Read more...

  • Article

    Alternative Info-Sharing Bill Unveiled

    Measure Includes Liability, Privacy Provisions Businesses Seek By Eric Chabrow
    Alternative Info-Sharing Bill Unveiled

    The Senate Intelligence Committee could consider in the coming days new cyberthreat information sharing legislation that's seen as more to the liking of the business community than the measure proposed by President Obama.

  • Article

    'Freak' Flaw Also Affects Windows

    Microsoft Sounds SSL/TLS Alert, Joining Apple, Google By Mathew J. Schwartz
    'Freak' Flaw Also Affects Windows

    All Windows operating systems are at risk from the SSL/TLS vulnerability known as Freak, Microsoft warns. The company has outlined temporary workarounds - except for Windows Server 2003. Experts say no in-the-wild attacks have yet been seen.

  • Blog

    Clinton's Email Brouhaha and Politics

    Coverage Focus Segues from Secrecy to Security By Eric Chabrow
    Clinton's Email Brouhaha and Politics

    Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.

  • Article

    Apple, Android Prep 'Freak' Fix

    Exploiting Crypto Flaw Breaks HTTPS on Devices, Sites By Mathew J. Schwartz
    Apple, Android Prep 'Freak' Fix

    Many Apple and Android devices are vulnerable to a TLS/SSL "Freak" flaw, which could be exploited to subvert secure Web connections. The flaw is a legacy of U.S. government export restrictions on strong crypto.

  • Article

    Reversal of Fortune: DHS Funding OK'd

    Boehner Persuades Enough GOP Lawmakers to Back Measure By Eric Chabrow
    Reversal of Fortune: DHS Funding OK'd

    Congress has voted to fund the Department of Homeland Security through September, the end of the fiscal year, averting another threatened shutdown that would have curtailed some cybersecurity programs.

More news...

Webinars

More webinars...

White Papers

  • Addressing the Cyber Kill Chain - Are you prepared?

    As clearly evidenced by the daily headlines about security breaches, traditional defense tools are failing to protect enterprises from advanced targeted attacks. A deeper understanding of these...

  • HP Cyber Risk Report 2015: Executive Summary

    The headlines show us any business can become a victim of cyber crime. To fight back, we need to understand the vulnerabilities that exist in IT infrastructure and applications and how hackers...

More whitepapers...
ARTICLE Automating the InfoSec Career Path

The Information Systems Security Association will soon roll out an online tool that will generate...

Latest Tweets and Mentions

ARTICLE Automating the InfoSec Career Path

The Information Systems Security Association will soon roll out an online tool that will generate...

The ISMG Network