The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
A federal agency is offering a free online training program that provides useful insights on protecting information privacy. Learn how this clever training "game" works.
A Twitter posting by an individual claiming to be from the hacktivist collective Anonymous claimed it targeted GoDaddy on Sept. 10, but it wasn't until the following day the company determined its computers were not breached.
An individual claiming to be part of Anonymous, the hacktivist group that has targeted big business and government, seems to have taken aim at small businesses by claiming to have disrupted website host GoDaddy.com.
Owners of Apple iPad, iPhone and iPod Touch devices whose unique device identifiers might have been exposed in a breach would face little, if any, potential harm as a result.
The Democratic Party platform on cybersecurity suggests that President Obama will take unilateral action to safeguard the nation's critical IT infrastructure because of Congress' inability to enact comprehensive cybersecurity legislation.
When asked about their computing habits, a majority of those surveyed say they never use the cloud, though their online habits show that nearly all of them do.
Cyberthieves are exploiting weaknesses in the U.S. payments infrastructure as an easy-to-travel avenue for access to intellectual capital, says risk consultant Bill Wansley. What can be done to stop them?
A second member of the LulzSec hacktivist group has been arrested in connection with last year's Sony Pictures Entertainment breach. Learn about the latest details from the FBI.
Cyber is part of our everyday lives. Still, in many cases, a natural - or perhaps an unnatural - divide exists between the virtual and physical worlds. This is especially true in the way we deal with crime.
Information security leaders increasingly take risk concerns to their boards of directors. But do they accurately articulate their messages? Heartland Payment's CSO warns of the most common mistakes.
At St. Dominic-Jackson Memorial Hospital in Mississippi, a proactive breach prevention strategy has dramatically reduced privacy violations involving nosy healthcare workers inappropriately accessing medical records.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
When two organizations merge, their top security/privacy challenge doesn't necessarily involve technology. Sometimes it's culture, says Christopher Paidhrin of PeaceHealth Southwest Medical Center.
More organizations are expected to purchase cyber insurance in the coming years as risk managers become more involved in buying these types of policies.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.