Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
As David Shearer steps in as the new executive director of (ISC)², he inherits a huge challenge: How does the consortium respond appropriately to the global information security staffing shortage?
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
How can banking institutions prepare for beefed up cybersecurity exams by regulators next year that likely will scrutinize their security awareness efforts? One federally funded training program could help.
A top-flight IT security team requires individuals with know-how in a wide range of non-technology disciplines, in addition to those with technical expertise, cybersecurity leaders say.
Luxury retailer Neiman Marcus has hired its first chief information security officer following its data breach late last year that compromised approximately 350,000 payment cards.
Amy McHugh, a former FDIC IT examination analyst, says banking regulators will soon scrutinize C-level executives and boards of directors to gauge their cybersecurity awareness in the wake of the FFIEC's pilot cyber-risk assessment program.
Sen. Ron Johnson, R-Wis., the presumptive chairman of the Senate committee with government IT security oversight, hasn't immersed himself heavily in cybersecurity issues during his 4-year Senate tenure.
The National Institute of Standards and Technology has released a draft of guidance aimed at helping government agencies and businesses establish, participate in and maintain cyberthreat information sharing relationships.
In new guidance from the PCI Council, its leaders outline why businesses that handle card data need to address employee education. Here, experts explain why this guidance is a positive step for card security.
Sophisticated threats require advanced threat protection. A threat-focused next-generation firewall must adhere to three strategic imperatives. Learn how these imperatives improve defense against advanced threats.
A bill before Congress to encourage the sharing of cyberthreat information won't come up for a vote until lawmakers act on legislation to end NSA's bulk collection program, says Senate Homeland Security Committee Chairman Tom Carper.
What advice does the first CISO have for today's security leaders? Steve Katz speaks up on top security threats, how to defend against them and what it takes to lead an effective security team.
Emerging reports now suggest other financial institutions may have been targeted by the same hackers who breached Chase. But how can we be sure? Mark Clancy of the Depository Trust & Clearing Corp. explains why the analysis is challenging.
Twitter is suing the federal government, seeking to pave the way to publish its transparency report that documents the government's requests for user information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.