What are some of the unique challenges organizations face when they move into continuous monitoring and risk mitigation? Scott Gordon of ForeScout and Ken Pfeil of Pioneer Investments offer insight.
Rather than waiting until they're a breach victim, organizations should reach out to law enforcement officials to develop a good working relationship in battling cybercrimes, federal prosecutor Erez Liebermann says.
Sharing information about cyber-attacks is making a difference in the banking sector, helping bring criminals to justice and curbing fraud losses. Other sectors should learn from banking's example.
Stabilizing cybersecurity leadership at the Department of Homeland Security should be a priority for Jeh Johnson if he's confirmed as DHS's next secretary, government IT security experts say.
In releasing the preliminary version of the cybersecurity framework, the head of NIST re-emphasized the voluntary nature of the guide, but he said critical infrastructure operators have a responsibility to adopt the recommended best practices.
What is hostile profile takeover, and why does this emerging threat pose such a risk to smart phone users? Dave Jevans, CTO of Marble Security, describes this and other new mobile threats.
What are some of the unique challenges organizations face when they move into continuous monitoring and risk mitigation? Scott Gordon of ForeScout and Ken Pfeil of Pioneer Investments offer insight.
Organizations must develop a "defensible response" to data breaches and fraud incidents because of the likelihood of a regulatory investigation or legal action, says attorney Kim Peretti, a former Department of Justice cybercrime prosecutor.
The Obama administration says it's bringing in top technology talent to fix the problems plaguing health insurance exchanges. But some technical experts say the strategy raises questions about the seriousness of the issues to be resolved.
Organizations collect a wealth of information as part of their governance, risk and compliance programs, and security professionals are missing out on important insights if they don't take advantage of it.
IT security leaders need to develop a strong, holistic security and risk management strategy as they implement advanced, strategic technical capabilities, IBM's David Jarvis says in analyzing new survey results.
What's it take to succeed as an information security leader? J.J. Thompson of Rook Consulting, Malcolm Harkins of Intel and others offer insights on the growing number of skills that are now essential.
Banking institutions are becoming more comfortable with sharing information about cyber-attacks and fraud. And some threat-intelligence vendors are helping to pave the way for expanded collaboration.
An insurer has dropped its lawsuit aimed at avoiding covering damages suffered in the Schnucks retail breach. But attorney Dan Mitchell says this case shows why more companies need cyber-insurance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.