A willingness to compromise expressed at a House hearing on President Obama's cyberthreat information sharing initiative offered a sign of hope that legislation to get businesses to share such data could pass Congress and be signed into law.
Lawmakers have begun the process of taking up President Obama's call to enact cyberthreat information sharing legislation. But can Congress reach a consensus on appropriate liability protection, the issue that derailed earlier legislative proposals?
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.
At a White House summit at Stanford University today, President Obama will sign an executive order to encourage more private sector information sharing. But will businesses buy into his proposals?
Not wanting to "let a good crisis go to waste," White House Cybersecurity Coordinator Michael Daniel is using health insurer Anthem's massive data breach to promote the Obama administration's cybersecurity initiatives.
President Obama has tapped veteran CIO Tony Scott as the top government IT official whose responsibilities include overseeing agencies' compliance with FISMA, the law that governs federal government IT security.
IBM Trusteer malware researcher Ori Bach says financial fraud attacks coming out of Brazil are having a global impact, and he offers insights and lessons for banking institutions throughout the world.
If 2014 was a harbinger of things to come, 2015 will be a banner year for IT security employment. Government statistics show that employment in one segment of the IT security workforce - information security analysts - soared by 42 percent in 2014.
The president's proposal would provide stronger privacy protections than legislation passed by the House in the last Congress, and furnish targeted liability protections to businesses that share cyberthreat information.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
As the 114th Congress convenes this week at a time of growing public awareness of security breaches, it's expected to consider cyberthreat information sharing measures. But can the White House and Congress resolve past differences over the legislation?
Driven by the spectre of external threats, attacks and growing business expectations, can CISOs focus on risk management and take a more integrated and systematic approach to defend against attacks?
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Richard Spurr has been CEO of security vendor ZixCorp for more than 10 years. How has his approach to e-mail security evolved, and how does he see evolving threats and the marketplace changing in the year ahead?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing cuinfosecurity.com, you agree to our use of cookies.