A review of the RSA 2014 agenda shows several seminars, panels and speakers of particular interest to healthcare-focused attendees, including those focused on mobile device security and medical device hacks.
They're thought-leaders. Movers and shakers. VIPs and MVPs within their industry sectors. And their actions weigh heavily on how information security is practiced, taught and tested. These are 2014's Influencers.
Anecdotal evidence usually supports the data the Labor Department culls on IT security employment. Usually isn't always, and the 2013 stats reported by the Bureau of Labor Statistics are at odds with what is likely true.
Evidence is mounting that the breaches reported by Target and Neiman Marcus are part of a wider assault against U.S. retailers. Meanwhile, payment card-issuing institutions say they're taking proactive steps to keep fraud at bay.
Technology is the biggest challenge to ethics and compliance in organizations today, says Deloitte's Keith Darcy. "We have the capacity to do things before we ever consider the ethical consequences ..."
Dan Clements of IntelCrawler, the research firm that claims it traced malware apparently used in the Target breach and other retailer attacks to a 17-year-old hacker in Russia, offers an exclusive, in-depth explanation of his company's findings.
First Target, then Neiman Marcus; who's next? And while banking institutions await the next attack, how should they respond to customers' anxious questions about this latest round of high-profile retail data breaches?
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.