Bipartisan legislation known as the USA Freedom Act, which would effectively end the National Security Agency's bulk phone records collection program, has been introduced in Congress.
The buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an array of enticing tchotchkes - including selfie sticks and sharks with laser pointers on their head.
Legislation to encourage businesses to share voluntarily cyberthreat information with the federal government by giving them liability protection has won overwhelming approval by the House of Representatives.
The Internet as we know it may be heading toward fundamental changes in the coming decade as a result of an intense privacy debate, says Internet pioneer and DNS guru, Dr. Paul Vixie. Find out his predictions.
As the House prepares to vote this week on two cyberthreat information sharing bills, their fates will rest as much on the White House's reaction to the proposals as on what happens in Congress.
The more organizations structure business and processes around online identities, the more they navigate in tricky legal waters, says attorney Tom Smedinghoff, who offers guidance.
The privacy profession is evolving rapidly, and security leaders increasingly need to understand the unique demands and responsibilities that come with protecting privacy. But where do they gain this insight?
Intel Security CPO Michelle Dennedy has just written the book on privacy. What are the key components of her manifesto, and how can her ideas reshape how security pros approach privacy?
Witnesses testifying at a House hearing offered divergent views on the language of legislation to nationalize data breach notification, showing the challenges lawmakers face in crafting a bill that can pass Congress and be signed by the president.
A proposed national data breach notification bill to usurp 47 state statutes could make it easier for businesses to notify consumers of a breach. But is that worth weakening PII protections some states offer? Massachusetts plans to do battle.
Mattel will sell a cloud-connected $75 "Hello Barbie" doll that can "listen" to what kids are saying and talk back. But security experts warn that anything that connects to the Internet can - and will - be hacked.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.
The Obama administration's discussion draft for a Consumer Privacy Bill of Rights law has some of the president's usual supporters saying they're disappointed in his proposal. Find out why.
The FCC's new "net neutrality rule," which prevents ISPs from slowing down content streaming along their networks and from charging extra fees to assure faster speed, includes provisions designed to protect the confidential information of customers.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.