Israel's intelligence agency supervises commercial banks' IT systems because they're considered part of the critical national infrastructure, and that's okay with the bankers. See why.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
Factors driving up the index vary from month to monthly, but the clear takeaway of the survey of IT security practitioners is that they're getting more apprehensive about safeguarding IT.
The lack of common definitions, understandings and approaches among countries may hamper international cooperation on cybersecurity, a need acknowledged by most countries.
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
Organizations are urged to adopt six principles to avoid the perils of transferring IT decision making away from technology specialists to business unit leaders.
Jet Propulsion Laboratory IT Chief Technology Officer Tom Soderstrom is showing that a deliberate, methodical approach can lead to effective and secure cloud computing.
"I'll probably be hanged for this, but I really believe the cloud can be more secure than what we do today," says Tom Soderstrom, chief technology officer at NASA's Jet Propulsion Laboratory.
Not all hackers are the same, and that presents problems in defending against them. Understanding each type of hacker can help organizations better prepare for digital assaults.
RSA Chief Technologist Sam Curry defends the company's approach to public-key cryptography after researchers suggest a flaw in its encryption algorithm, contending the problem exists elsewhere in the security chain.
For years, security experts have advised users to wipe their hard drives before discarding them. About 100 owners of one brand of tablets may have wished they did.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
Verisign Inc. may have followed the letter of the law when revealing a series of breaches in an SEC filing. But the company that assures the flow of a hefty portion of Internet traffic should have been more forthright to ease the minds of its various constituencies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.