While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
Having a CISO within an organization can help in holding down data breach costs, says the Ponemon Institute's Larry Ponemon, who, along with Symantec's Robert Hamilton, analyzes new survey results.
The National Institute of Standards and Technology has published new guidance on malware incident prevention and handling for desktops and laptops as well as enterprise patch management technologies.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
As social media use grows, so do the risks of organizations getting caught up in costly legal disputes over ownership and assets. Alan Brill of Kroll advises on how to mitigate such risks.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Former White House privacy counselor Peter Swire says the time is right to re-evaluate the checks and balances surrounding government programs that collect data on American citizens.
Despite what's now been a two-month break from hacktivists' DDoS attacks on banks, we can expect more assaults from Izz ad-Din al-Qassam Cyber Fighters. And this next wave should concern us all. Here's why.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.
The federal government has identified dozens of cases of alleged falsification of reports submitted by investigators - federal employees and contractors - examining individuals being considered for security clearances.
President Obama wants Americans to trust his administration on the way it collects data from Internet and telephone communications in the search for terrorists. Does the president deserve that trust?
The United States and Russia are creating a new working group to assess emerging online threats. The group, announced by the White House, will begin work within the next month.
Advanced threats and mobile security were the buzzwords of the Gartner Security & Risk Management Summit. What new insights did thought-leaders share, and how can they reshape our security posture?
National Security Agency Director Keith Alexander declined to say that the agency would stop using contractors in top secret IT positions to prevent a leak such as the one that exposed NSA programs to collect metadata on American citizens.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.