What will it take for the security leaders of 2020 to be the true guardians of their enterprises? Daniel Lohrmann shares insight in a keynote address from the Gulf Information Security conference in Dubai.
A report that Russian hackers read President Obama's email correspondence raises further questions about White House cybersecurity, say IT security experts, who offer insights on protecting White House systems.
Bank of the West prides itself on being an innovator in customer education about fraud prevention. But customers still don't want to be inconvenienced with arduous security hoops, says bank fraud prevention officer David Pollino.
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
The buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an array of enticing tchotchkes - including selfie sticks and sharks with laser pointers on their head.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.
HP's annual Cyber Risk Report says APJ CISOs faced major vulnerabilities during the past year due to coding discrepancies, server misconfigurations, rising mobile malware and other factors. Experts recommend ways to mitigate risk.
The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015.
The Internet as we know it may be heading toward fundamental changes in the coming decade as a result of an intense privacy debate, says Internet pioneer and DNS guru, Dr. Paul Vixie. Find out his predictions.
Governance, risk and compliance efforts have failed to evolve in the Indian marketplace, says Vidya Phalke of MetricStream. He believes most organizations lack a proper framework, and they must build a robust GRC culture.
Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information.
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.