A report from the Rand Corp. says the dearth of cybersecurity professionals puts the U.S. at risk, but the situation should improve. The NSA, however, is successfully attracting IT security specialists.
Letting women make mistakes, as men are allowed to do, could help grow the female IT security workforce from its current level of less than 30 percent. That's a conclusion of a panel of IT security experts assembled by Information Security Media Group.
There's an app for that...but is it secure?
Home-grown enterprise apps improve productivity, business partnerships, customer satisfaction and bottom-line performance. But all too often, security is an afterthought and little more than thin shield from issues of compliance and privacy that plague many...
Enabling Simple and Secure Mobile Collaboration for Business:
Once upon a time, mobility was synonymous with email access. But, mobile collaboration now has so much more potential to unlock true productivity and facilitate real work in real time. Many companies have only scratched the surface and have yet to...
The U.K. government's legal justification for spying en masse on British residents' online communications - Google searches, Facebook posts, Webmail - is questioned by privacy and Internet law experts as part of a case triggered by Edward Snowden's leaks.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Organizations of all sizes have difficulty finding the time, personnel or cash to install a security monitoring solution, so they make do with periodically checking logs - except the logs often don't get checked, and many
times, the personnel doesn't even know how to look for security issues.
This white paper...
The promise of SIEM is to provide continuous situational awareness, automate compliance reporting, and support the incident response process through root cause analysis and serve as an investigation
platform. Unfortunately, due to the perceived negatives, smaller, more resourced-constrained security departments that...
The U.S. federal government's top telecommunications regulator is proposing a "new regulatory paradigm" by calling on communications providers to step up and assume new responsibilities to manage cyber-risks.
Although restaurant chain P.F. Chang's has not yet confirmed a breach, several researchers say they believe the chain suffered a malware attack similar to those that compromised Target, Neiman Marcus and Sally Beauty.
Breaking down silos should help organizations mitigate vulnerabilities introduced into their systems from the information and communications technology supply chain, says the co-author of new guidance from NIST.
As the Office of the National Coordinator for Health IT thinks through care models and broader issues of big data, Karen DeSalvo, head of the office, says it's striving to ensure privacy and security for patients.
Continuous monitoring is helping Freddie Mac reduce the number of security controls it uses to safeguard its information systems, says CISO Patricia Titus, who summarizes lessons that can apply to government and private-sector entities.