It's been just over a year since health plan Anthem Inc. reported a record-breaking hacker attack affecting nearly 79 million individuals. A number of key lessons have emerged from that breach that other organizations can apply to improve their own data security.
With the Apple-FBI legal battle underway - plus rising worries over cybercrime, the Internet of Things and more - there's plenty to discuss, debate and learn at RSA Conference 2016 in San Francisco.
As a result of high-profile breaches, emerging malware threats and increased regulatory scrutiny, CISOs at financial institutions are under more pressure than ever to develop innovative strategies for enhancing cybersecurity. And the CISO's evolving role will be a hot topic at RSA Conference 2016.
As the debate intensifies over Apple's refusal to help the FBI crack the iPhone password of one of the San Bernardino shooters, Rep. Will Hurd says Congress should not rush to enact legislation that would require technology companies to weaken encryption. Hurd chairs a subcommittee with cybersecurity oversight.
Think it's tough now for the government to compel Apple to retrieve encrypted data from a locked iPhone? According to news reports, Apple is busy creating new devices and services that will be even harder to hack.
The Healthcare Information and Management Systems Society 2016 Conference, slated for Feb. 29 to March 4 in Las Vegas, will offer dozens of privacy and security educational opportunities worth checking out.
Tim Cook says he found out about the court order to help the FBI break into the iPhone of one of the San Bernardino shooters from the press. "I don't think that something so important to this country should be handled that way," the Apple CEO says.
It used to be that security was the one big barrier to organizations embracing the cloud. But Troy Kitch of Oracle says that not only is that barrier coming down, but now leaders are seeing cloud as a security enabler.
Cybersecurity competitions are being adapted so employers can use them to vet the know-how of prospective employees, U.S. Cyber Challenge National Director Karen Evans says.
Who's right: Apple or the FBI? Our readers continue to debate a magistrate judge ordering Apple to help unlock an iPhone tied to a San Bernardino shooter, raising such issues as strong crypto, backdoors as well as legal and moral responsibilities.
None of the major presidential candidates unequivocally backs Apple in its privacy vs. security battle with the U.S. government over its refusal to help the FBI crack the password of the iPhone of one of the San Bernardino, Calif., shooters. Hear what each of the candidates has to say.
In an in-depth interview, CIO Ed Ricks of Beaufort Memorial Hospital in South Carolina offers insights on how the community hospital, with limited resources, is tackling breach prevention and detection. He'll be a featured speaker at the HIMSS 2016 Conference.
With word of her retirement, Donna Seymour received criticism and praise for her work in response to the hack of the agency's computers that exposed the personal information of 21.5 million individuals.
Leading banking Trojans are expanding their targets, taking aim at industries outside banking to compromise financial accounts and other information, new research shows. And the botnets are proving difficult for law enforcement officials to take down.
Security experts warn enterprises to patch the serious "glibc" domain name system flaw now, with one likening it to a "skeleton key" that could be used against all systems and Internet of Things devices that run Linux.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.com, you agree to our use of cookies.