White House Cybersecurity Coordinator Michael Daniel sees significant savings in continuous diagnostics because the automated approach to identifying systems vulnerabilities could replace costly checklist compliance reporting.
Version 3.0 of the PCI Data Security Standard is coming, and draft guidelines reflect the impact of recent retail breaches. PCI GM Bob Russo explains big changes to ensuring payment card security.
Hope springs eternal at the White House, at least when it comes to Congress passing meaningful cybersecurity legislation. Read about our exclusive conversation with a senior administration official.
In the wake of the NSA leak by former systems administrator Edward Snowden, how can organizations limit the amount of data access offered to those managing IT systems? Former CIA CISO Robert Bigman explains.
The malware attack that infiltrated Harbor Freight Tools' network could prove to be one of the biggest retail breaches this year, experts now say. Learn why card fraud linked to the attack is expected to grow.
DDoS attacks launched by hacktivists are often viewed as little more than an interruption to online services. But Terry Ray of Imperva highlights a greater worry hidden behind these attacks.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
Having a CISO within an organization can help in holding down data breach costs, says the Ponemon Institute's Larry Ponemon, who, along with Symantec's Robert Hamilton, analyzes new survey results.
Here's an argument for why recent indictments linked to what's been called the largest-ever card fraud scam won't deter fraud - and why improved security is a better deterrent.
Izz ad-Din al-Qassam Cyber Fighters' attacks on U.S. banks are back, and strikes waged July 31, without a doubt, prove it, says Akamai's Mike Smith. So why are security experts so puzzled by recent DDoS events?
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.
The author of the forthcoming book "Secrets and Leaks" explains why the acts of NSA whistleblower Edward Snowden don't carry the same weight as those of Pentagon Papers leaker Daniel Ellsberg.
IT security pros see metrics as a useful tool to validate operational performance. But many organizations' top leaders evaluate security on cost. It's time to bridge that gap.
The National Security Agency is piloting a new program, as a result of the Edward Snowden incident, in which systems administrators with top-secret clearance can access certain secret documents only with the approval of another colleague.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.