An address by FBI Director James Comey at the RSA security conference seems to equate civil liberties and privacy. But when he offers an example of balancing Americans' rights with cybersecurity, he mainly refers to the civil liberties, not privacy.
Simple credentials, such as passwords, are a hacker's best friend, says Phillip Dunkelberger of Nok Nok Labs, a founding member of the FIDO Alliance. That's why the alliance is working to reduce reliance on passwords by enabling advanced authentication.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
Bipartisanship - a rare commodity on Capitol Hill - manifested itself with the House Homeland Security Committee's approval of a bill aimed to help buttress the cybersecurity of the nation's critical infrastructure.
Six technology companies that sued the government to allow them to disclose secret requests for customer information have made their first revelations under terms of an agreement reached late last month with the government.
Anecdotal evidence usually supports the data the Labor Department culls on IT security employment. Usually isn't always, and the 2013 stats reported by the Bureau of Labor Statistics are at odds with what is likely true.
The breach at Target stores that may have affected as many as 40 million credit and debit card account holders is a watershed moment that could greatly raise awareness of cybersecurity risks, says privacy attorney David Navetta.
Amidst draft legislation and the fallout of large-scale breaches, now is both the best and worst of times for privacy, says Trevor Hughes of the IAPP. What are the best career opportunities for privacy pros?
BankInfoSecurity and CUInfoSecurity have announced their annual list of Influencers to acknowledge individuals and organizations that are playing critical roles shaping information security and privacy.
With information freely available about anyone on the Internet, ISACA's Robert Stroud says security professionals need to better monitor and control how personal information is being accessed and used.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
Undeterred, two senators will try again to get their colleagues to enact legislation that they contend would better safeguard sensitive information and notify consumers of a data breach when personally identifiable information is exposed.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.