In an in-depth interview, Adam Sedgewick, the point man for the NIST cybersecurity framework, addresses misconceptions about the guidance, the costs to implement it and its role as a marketplace catalyst.
Canada is considering adopting tougher data security and cybercrime legislation that could serve as a model for other nations, says Claudiu Popa, an information security expert who'll be a panelist at the Fraud Summit Toronto.
Digital privacy isn't a privilege or a policy. It's a fundamental human right, says Rajesh Vellakkat, partner in the law firm of Fox Mandal & Associates. What are today's top legal challenges to privacy?
A Google-like search engine known as ICReach has enabled government agencies to share more than 850 billion records from phone calls, e-mails and Internet chat sessions, according to a report that cites leaked documents from Edward Snowden.
What lessons can be learned from recent high-profile breaches? IT security experts John Pescatore of the SANS Institute and Ron Ross of NIST explain how organizations can work to mitigate the new-style data breach threat. Listen to the conversation.
Security intelligence firm LogRhythm has launched what it calls a "threat intelligence ecosystem" in collaboration with five other security vendors, giving customers the ability to customize the information they want in their intelligence feeds.
Financial institutions feel the pain of recent retail breaches, and they seek new ways to secure payments and fight fraud. But how can security leaders influence changes within their own organizations?
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
As more organizations accommodate employees' demands to use mobile devices, ensuring the security of the applications on those smart phones and tablets has become critical. That's why NIST is developing new apps testing guidance.
As UPS Stores reveals that 51 of its locations were infected with POS malware, a restaurant in New Orleans confirms its POS system was breached using Backoff - malware about which federal authorities recently issued a warning. Experts offer analysis.
News about the existence of a new government leaker exposing national security documents shows that - even one year after Edward Snowden - organizations still don't have a handle on the insider threat.
The breach at Community Health Systems that compromised information on 4.5 million patients was the result of hackers taking advantage of the Heartbleed flaw, according to one security vendor. Other security experts weigh in on the potential cause.
With the clock ticking on the current legislative session, and with his retirement just months off, Sen. Jay Rockefeller is mulling whether Congress needs to enact legislation to regulate how airlines use and protect passengers' private information.