"I can say with very little hesitation that the challenge - certainly one of the biggest professional opportunities of my life - was not disappointing," the deputy undersecretary for cybersecurity says of his DHS tenure.
In a conversation with Chinese President Xi Jinping, President Obama raised concerns about cybersecurity, but his tone with the newly installed leader was not confrontational.
Most people will remember March 13, 2013, as the day Cardinal Jorge Bergoglio ascended to the papacy as Pope Francis. But for those who consider cybersecurity vital for society's well-being, it's an historic date as well.
More hackers are attacking payment processors and merchants with enhanced malware to compromise credit and debit card data. What steps can be taken to thwart the threat?
Mobility and privacy: Increasingly, organizations are forced to take actions on these topics. What are the latest legal and regulatory trends? Attorneys David Navetta and Ronald Raether share insights.
The Obama administration is calling on the Chinese government to take serious steps to halt cyber-intrusions emanating from China that have resulted in the theft of intellectual property from American companies.
DDoS attacks on banks have returned, and the attackers are changing their tactics. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.
DDoS attacks on banks have returned, and the attackers are changing their tactics and expanding their attack toolsets. How must organizations change the way they defend against DDoS? Carlos Morales of Arbor Networks shares strategies.
Prolexic's CEO Scott Hammack says battling distributed-denial-of-service attacks has become part of everyday business. And during this in-depth interview, he explains why.
Internet visionary Vint Cerf sees the development of strong authentication for the billions of devices connected to the Internet as the IT security community's next big challenge.
Organizations in 2013 will continue to explore new authentication solutions to improve user access to sensitive information. What are the specific solutions employed by this panel of security leaders?
Companies wanting to share cyber-threat information with the government and other businesses should adopt the U.S. Defense Department's doctrine of information superiority, says Lares Institute Chief Executive Andrew Serwin.
Hacktivists have formally launched their third wave of distributed-denial-of-service attacks on U.S. banking institutions, and their botnet is growing. How should institutions prepare to defend?
Bank of America confirms hacktivists' reports about a breach of a third-party service provider working with the bank to analyze public data. How did the breach occur, and what information was exposed?
The private sector has a unique opportunity to respond to President Obama's cybersecurity executive order and help shape information sharing and critical infrastructure protection. David Burg of PwC tells how.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.