In his first three weeks on the job, Farzad Mostashari, M.D., national coordinator for health information technology, made good on his pledge to improve communication in his office.
Rotating agents every three years through field offices is seen as having a detrimental affect at developing the skills needed to investigate national security intrusion cases.
Deven McGraw, co-chair of the Privacy and Security Tiger Team, discusses its most recent recommendations for rules and regulations and asks for suggestions on additional topics to address.
The latest Verizon Data Breach Investigations Report is out, and the good news is: The number of compromised records is down. The troubling news is: The number of breaches is up. Bryan Sartin, one of the report authors, explains why.
Globally, cloud computing is embraced as a practice beings great cost and technology efficiencies to financial institutions. But count Singapore among the nations that is proceeding cautiously while addressing security concerns, says James Lee of Trend Micro Inc.
Sony Corp.'s announcement that hackers may have accessed data on 77 million gamers follows a long line of recent breaches. And Neal O'Farrell of the Identity Theft Council says the string of incidents has led to consumer 'breach fatigue.'
A focus on cost and speed, not on data protection, creates a security hole, a survey of cloud computing service providers reveals. Nearly two-thirds of providers say they aren't confident cloud apps are sufficiently secured.
"If you want to defend your computer completely, you better not connect it to the Internet, not use it, not even power it on. So we got to get to a different place." DHS Deputy Undersecretary Philip Reitinger says.
Four years ago, the Council of Registered Ethical Security Testers began as an organization to bring standardization to the penetration testing industry. Today, CREST's scope is expanding across industries and global regions, says president Ian Glover.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.