While organizations wait for possible cyberthreat intelligence sharing legislation, the community is proactively working to share valuable information among different industries, says MS-ISAC Chairman Will Pelgrin.
As organizations prepare to move critical workloads to the cloud, more stringent security and compliance requirements emerge. This report examines the strengths and shortcomings of existing cloud platform security technologies, and defines an approach to overcome these limitations and leverage existing technology to...
How Are Organizations Tackling Today's Top Mobile Security Challenges?
Organizations of all sizes are accommodating the bring-your-own-device trend before taking the time to consider this: How do we secure the systems and data accessed broadly by employees' mobile devices? The Beyond BYOD: Mobile Security...
As NIST continues to develop a cybersecurity framework that mostly private operators of the nation's critical infrastructure could voluntarily adopt, what are the key gaps that still need to be filled?
Though others deemed Bruce McConnell as one of the government's most innovative security thought-leaders, he says his vision of how best to secure IT evolved during his just-ended 4-year tenure at DHS as a senior cybersecurity policymaker.
Organizations won't effectively share cyberthreat intelligence until they have more efficient ways of gathering and prioritizing data, says EMC's Kathleen Moriarty, author of a new report about information sharing weaknesses.
The Federal CIO Council will trim its committees from six to three to focus its efforts on IT security, portfolio management and innovation. Each committee will report to a 14-member executive committee chaired by Federal CIO Steven VanRoekel.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.
What do TV's The Big Bang Theory, the computer game Call of Duty and traveling have in common? They're the top leisure pursuits enjoyed by IT security professionals. But what are other common attributes?
Phyllis Schneck, the next deputy undersecretary for cybersecurity at the Department of Homeland Security, comes to the job with a different set of experiences than her predecessors - and that could prove valuable.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
The best ideas to secure the Internet do not come from the top-down government approach imposed by some foreign governments, but from the openness derived by a multi-stakeholder process, says Christopher Painter, America's top cyber diplomat.
Online account takeover occurs when an unauthorized party gains access to an existing bank account by stealing the access credentials and is followed almost invariably by the illegal movements of funds. In today's increasingly connected world, the growth in connectivity, convenience, speed, technology adoption, and...
Having a CISO within an organization can help in holding down data breach costs, says the Ponemon Institute's Larry Ponemon, who, along with Symantec's Robert Hamilton, analyzes new survey results.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.