"While securing energy, financial, health and other resources remain vital, the future of the innovation and the economy will depend on the success of Internet companies and ensuring that these companies are trusted and secure is essential," Commerce Secretary Gary Locke says.
It's not easy to read into LulzSec's motivation. They seem intolerant of those who know the rules but fail to follow them, such as IT security professionals who reuse passwords. They're brazen, and they're in it for the laughs.
Kundra joined the Obama administration in March 2009 as administrator for e-government and IT at OMB and given the additional title of chief information officer, the first person to officially hold that post.
No one is really sure when the FFIEC's new authentication guidance will be issued, but we do know banking institutions can't afford to wait. Hence, our new FFIEC Authentication Guidance Resource Center.
The three most common findings during an IT security examination are vendor management issues, a need for improved wire transfer controls, and necessary updates to risk assessments, says Phillip Hinkle, Chief IT Security Examiner for the Texas Department of Banking.
Recent hacks have uncovered security vulnerabilities that should have been addressed years ago. "These attacks are going to escalate," says Josh Corman of The 451 Group. But organizations can implement basic steps to make the hackers' job harder.
An unencrypted laptop computer that's missing from the United Kingdom's National Health Service North Central London health authority contained information on 8.63 million people, according to a report on The Sun newspaper's website.
"Overall, this draft is not balanced," Rep. Henry Waxman, D-Calif., said at a hearing on the measure "It gives businesses too many protections and consumers not enough. It preempts strong state laws and replaces them with a weak federal one."
Adam Greene, the primary author of the proposed accounting of disclosures rule mandated under the HITECH Act, says healthcare organizations preparing to comply should make sure their audit logs are functioning well.
As Indian banks have migrated to new, electronic platforms including online and mobile banking, so too have the fraudsters. Vicky Shah, author of a new book on cyber crimes, offers insight to help protect banks and their customers.