When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.
Two servers that have protected hundreds of thousands of Internet users will be shuttered early next week, meaning that a number of people won't be able to access the Internet. But for most users, the event will go unnoticed. Here's why.
People receiving IT security graduate degrees are highly educated, but as the Center for Internet Security's William Pelgrin says, "We have a deficit of those individuals who can pick up the ball and run with it very quickly." He's doing something about that.
"Without combining relevant data sets impacting the network, security professionals will fail in characterizing threats and targeted intruder activity," says Ed Stoner, a senior Carnegie Mellon researcher.
The FTC claims hackers targeted the Wyndham hotel chain's network and exported debit and credit data to a domain in Russia. What do the breaches mean for card issuers, and what action should they take?
Banks and credit unions are investing in enhanced fraud detection, but are they spending money on the right things? The new Faces of Fraud survey report shows too many are still confused by updated FFIEC demands.