Acquiring IT security products gets more complicated every day, so SINET's John Muir says it's not unreasonable to expect that even the most informed CISO needs help in identifying the right hardware, software and services to obtain.
To know how best to respond to IT and communications failures, organizations first must collect information on such incidents, says Marnix Dekker, who co-authored a just-issued report on incidents for ENISA.
Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
Text-messaging by physicians and other clinicians poses serious potential patient privacy risks. But with security controls in place, some healthcare organizations are giving a green light to texting in certain circumstances.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
In the northeastern U.S., millions of residents are still coping with the devastation caused by Superstorm Sandy. Find out whether business continuity/disaster recovery plans are proving to be effective.
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
Hurricane Sandy slammed the East Coast Oct. 29, causing widespread damage and power outages. As a result, business continuity plans are being put to the test. How are governments, financial institutions and healthcare organizations responding?