How Prepared Is Your Organization to Defend Against Today's Advanced Threats?
Ashley Madison, Sony, JPMorgan Chase - what's your confidence that when the next big security incident erupts, your organization will be prepared to defend itself? Are you getting the security you expect from the investment your...
Security leaders expect the new Union budget to give a needed boost to cybersecurity education, as well as increased investment in critical infrastructure, biometrics and surveillance to fight cybercrime.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
The gut feeling many people have about their physical security hasn't quite developed in the digital world, presenting a challenge for homeland security officials, says State of Delaware Homeland Security Adviser Kurt Reuther.
Facial recognition, arguably, is the technology that most threatens individual privacy online, and that's on the mind of Senate Commerce Committee Chairman Jay Rockefeller, who has asked the FTC to report on its growing use.
Michigan this month merged government agencies responsible for physical and information security, consolidating resources as well as opening new areas for growth and partnership, state Chief Security Officer Dan Lohrmann says.
Merging government agencies responsible for physical and information security into a single operation makes sense, says Michigan's new chief security officer, Dan Lohrmann. After all, he says, the same technologies used to allow entry to a building also can be deployed to permit access to a sensitive database.
Government Accountability Office auditors say a lack of prioritization has kept agencies from requiring the use of personal identification verification credentials to obtain access to federal computer systems.