Today's information security professionals need to "be like a sponge and learn from various domains that are outside your niche," says Lee Kim, director of privacy and security at the Healthcare Information and Management Systems Society.
If the U.S. military awarded a decoration for hacking, Army Col. Gregory Conti would wear it proudly on his uniform. Hear Conti, director of the Army Cyber Institute, explain why ethical hacking helps drive America's innovation engine.
In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst.
The IAPP has launched a new privacy certification designed for IT, security and engineering pros. What are the key elements of this new program? JC Cannon, a privacy author and educator, shares details.
What lessons can be learned from recent high-profile breaches? IT security experts John Pescatore of the SANS Institute and Ron Ross of NIST explain how organizations can work to mitigate the new-style data breach threat. Listen to the conversation.
2014 has seen an explosion of mobile banking demand and services. But as the channel grows, so do the threats against it. What are today's top threats, and how can institutions offer more secure mobile banking?
Michael Daniel explains that among his biggest challenges as special assistant to the president is fully understanding the economics and psychology behind cybersecurity, topics that few people have mastered.
Apple's forthcoming iOS 8 includes a number of useful new security and privacy features, says Symantec threat researcher Candid Wueest. But there are missing features he'd still like to see implemented.
Christopher Augustin, new CIO at First Data, brings both a Wall Street and a start-up perspective to this role. How does he expect to incorporate security to enable the next generation of payments tech?
Millions of user credentials are breached regularly - whether we hear of the incidents or not. So, why do we continue to rely on passwords? Derek Manky of Fortinet discusses authentication and data retention.