Acquiring IT security products gets more complicated every day, so SINET's John Muir says it's not unreasonable to expect that even the most informed CISO needs help in identifying the right hardware, software and services to obtain.
To know how best to respond to IT and communications failures, organizations first must collect information on such incidents, says Marnix Dekker, who co-authored a just-issued report on incidents for ENISA.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
Text-messaging by physicians and other clinicians poses serious potential patient privacy risks. But with security controls in place, some healthcare organizations are giving a green light to texting in certain circumstances.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
Cybersecurity thought-leader Ira Winkler has just been named ISSA's new international president. One of his first tasks is overseeing the start of two new special interest groups. What is their mission?
In the northeastern U.S., millions of residents are still coping with the devastation caused by Superstorm Sandy. Find out whether business continuity/disaster recovery plans are proving to be effective.