It's an increasingly common question from CEOs. "How is our security program protecting the business?" Pamela Gupta of OutSecure shares insight on what CISOs should demonstrate when they answer that question.
The best ideas to secure the Internet do not come from the top-down government approach imposed by some foreign governments, but from the openness derived by a multi-stakeholder process, says Christopher Painter, America's top cyber diplomat.
The hotline, the communications link established between Washington and Moscow during the Cold War to avert a nuclear war, is being used to warn of potential cyber and environmental crises, the State Department's Christopher Painter says.
Kim Peretti, the ex-prosecutor who helped nab Heartland hacker Albert Gonzalez, says recent indictments offer insights into the actors behind global fraud schemes that affected 160 million cardholders.
A new incident response publication coming from the National Institute of Standards and Technology will include guidance on how to form circles of trust - networks of IT security experts spanning multiple organizations, says NIST's Lee Badger.
Getting critical infrastructure operators involved is the biggest challenge the federal government faces in creating a cybersecurity framework, says NIST's Adam Sedgewick, who leads efforts to create the framework ordered by President Obama.
The best argument for enactment of a federal data breach protection law to replace 46 state statutes is that physical location is not relevant in a society that relies on mobile technologies, says public policy advocate David Valdez.
Whether or not Congress enacts cyberthreat intelligence sharing legislation, the IT security community is moving forward with its own information sharing initiatives, MS-ISAC Chairman William Pelgrin says.
Most organizations rate their mobile device security efforts as poor, in need of improvement or just adequate, according to the latest ISMG survey. So where are the security gaps? Malcolm Harkins of Intel offers insights.