The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
When asked about their computing habits, a majority of those surveyed say they never use the cloud, though their online habits show that nearly all of them do.
Cyberthieves are exploiting weaknesses in the U.S. payments infrastructure as an easy-to-travel avenue for access to intellectual capital, says risk consultant Bill Wansley. What can be done to stop them?
News of Google's $22.5 million settlement with the FTC has come and gone, yet privacy issues reflected in the case remain a concern. How should organizations react, and what steps should they take now?
Cyber is part of our everyday lives. Still, in many cases, a natural - or perhaps an unnatural - divide exists between the virtual and physical worlds. This is especially true in the way we deal with crime.
Healthcare organizations need to rethink security best practices and tap new technologies as a result of the growth in health information exchange and the use of mobile devices, says researcher Carl Gunter.
One takeaway from the $1-billion-plus verdict against Android-maker Samsung for infringing Apple patents is that the users of infringed technology also could be held legally liable, patent attorney Jim Denaro says.
Advice from the report, Bring Your Own Device: A Tool Toolkit to Support Federal Agencies Implementing BYOD Programs, is applicable to all types of public and private organizations.
Preparing for an exam to assess FFIEC Authentication Guidance conformance can be daunting. But according to one bank's experience, it doesn't have to be. What words of advice does this institution share?
Information security leaders increasingly take risk concerns to their boards of directors. But do they accurately articulate their messages? Heartland Payment's CSO warns of the most common mistakes.
RSA's Etay Maor says Citadel malware and ransomware attacks highlight a growing threat banking institutions and consumers must be prepared to fight. What can institutions do to mitigate risk?
Ron Ross, the NIST IT security and risk guru, sees cloud computing as a vehicle to help organizations implement an information risk management framework.
By combining responsible management, risk management and compliance functions and internal audits, organizations will go far in securing their data and systems, says PricewaterhouseCoopers Partner Carolyn Holcomb.
More malware attacks fueled by Citadel and Reveton are getting attention from federal authorities, which say banking institutions and consumers should be on high alert. What can institutions do to mitigate emerging malware risks?
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.