A new incident response publication coming from the National Institute of Standards and Technology will include guidance on how to form circles of trust - networks of IT security experts spanning multiple organizations, says NIST's Lee Badger.
Addressing cyber-attacks is not just a technology issue. It requires a holistic view from the entire organization, says ISACA's Jeff Spivey, who emphasizes the need for a framework approach to security.
What top mobile security concerns should organizations be considering? As more devices connect to the enterprise, Akamai's Fran Trentley says there are certain priorities businesses must prepare to address.
Despite what's now been a two-month break from hacktivists' DDoS attacks on banks, we can expect more assaults from Izz ad-Din al-Qassam Cyber Fighters. And this next wave should concern us all. Here's why.
The European parliament recently voted to extend and strengthen ENISA. With this, the agency is expected to play a key role in top cybersecurity initiatives across the EU, says the agency's Steve Purser.
A side benefit of consolidating the military's 15,000 networks is the need for fewer systems administrators. Gen. Martin Dempsey, chairman of the Joint Chiefs of Staff, says that should help diminish the insider threat.
Here are some questions we'd like to ask the former systems administrator at the National Security Agency to learn more about the motivation behind his leak of the U.S. government's top-secret information collection programs.