The House Judiciary Committee, in passing a tailored bill to end the NSA's bulk collection program of phone records, rejected amendments to expand privacy reforms to other government surveillance initiatives.
The latest victim of malware attacks against point-of-sale system vendor NEXTEP is foodservice management company Compass Group, which says payment card data for up to 70,000 users of self-service kiosks was exposed.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.
(ISC)Â² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
Not all threat intelligence is created equally, says Fortinet's John Maddison. And it's not just external threats organizations should be most concerned about. Why more businesses need to focus on inside-out security.
At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.
This year's event was bigger than ever, overwhelming to take in, and no single challenge, strategy or solution emerged as a top priority - very much a reflection of today's information security marketplace.
Despite active attacks against the vast infrastructure that was created to support the 2012 Olympics, the games proceeded without a hitch. But making that happens required unprecedented levels of cross-vendor collaboration, says BT's Jason Cook.
Organizations are at greater security risk than ever, but they also continue to struggle to obtain adequate security staff. Robert Stroud of ISACA offers new recommendations to address the staffing shortage.
As a longtime security leader, Eddie Schwartz has felt acutely the pain of the security skills crisis. Now, as chair of ISACA's Cybersecurity Task Force, he's helping organizations do something about it.