The threat landscape has changed dramatically, and so must organizations' approach to cybersecurity. Jim Anderson of BAE Systems Applied Intelligence lays out the elements of the new cybersecurity agenda.
Most organizations are still doing poor jobs of adequately communicating threat information, even within their own organizations. Shawn Henry, President of CrowdStrike, offers strategies for the C-suite.
The new Identity Ecosystem Framework is ready for review. What do security professionals need to know? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.
As mobility cements itself as the ubiquitous technology of choice, the threats are evolving - and so must the defenses. Christy Wyatt of Good Technology on the future of enterprise mobility management.
As RSA Conference 2015 opens, ISMG's editorial team discusses the event's emerging themes and how they will be reflected in event coverage. What will be the key sessions and discussions in San Francisco?
The PCI Security Standards Council has published a new version of its data security standard that calls for ending the use of the outdated Secure Sockets Layer encryption protocol that can put payment data at risk.
Islamic State sympathizers are exploiting a vulnerability in a WorldPress Content Management System plug-in to deface the websites of news outlets, businesses, religious groups and governments in the U.S. and abroad, the FBI says.
The upcoming RSA Conference 2015 in San Francisco will feature sessions ripped from the headlines, reflecting the challenges security professionals face in safeguarding their organizations' systems and information.
SEBI has directed capital markets to develop and deploy a robust cybersecurity framework to combat cyber-attacks. Security leaders welcome the move and recommend effective controls to support the initiative.
AT&T, in a settlement with the FCC, agrees to pay a $25 million fine because call center employees in Mexico, Colombia and the Philippines accessed private information from some 278,000 customer accounts without authorization.
The DNS infrastructure underlying the Internet is the map that both the good guys and bad guys need. Dr. Paul Vixie, a member of the Internet Hall of Fame, discusses DNS' impact on the security landscape.