The Latest News

  • Pentagon Updates Cyberdefense Strategy

    Military Willing to Use Cyberwarfare to Protect U.S. Interests Pentagon Updates Cyberdefense Strategy
    Defense Secretary Ashton Carter

    The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies. Read more...

  • House OKs 2nd Cyber Info-Sharing Bill

    Two Approved Measures Will Be Combined House OKs 2nd Cyber Info-Sharing Bill

    The House on April 23 passed a second cyberthreat information sharing bill, the National Cybersecurity Protection Advancement Act. Now it will be combined with the previously approved Protecting Cyber Networks Act before it's sent to the Senate. Read more...

  • DHS to Open Silicon Valley Branch

    Secretary Johnson Seeks Stronger Relationships with Vendors DHS to Open Silicon Valley Branch
    DHS Secretary Jeh Johnson addresses the RSA conference.

    The Department of Homeland Security will establish a Silicon Valley satellite office to improve relations with IT security vendors and recruit cybersecurity talent, Homeland Security Secretary Jeh Johnson said in a keynote address at RSA Conference 2015. Read more...

  • Feds Take Lead on Info Sharing

    US-CERT Head on How Government Will Work With Industry Feds Take Lead on Info Sharing

    Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information. Read more...

  • 5 Problems Vex Federal InfoSec Hiring

    Solutions Posed to Close the Cybersecurity Talent Gap 5 Problems Vex Federal InfoSec Hiring

    A new Partnership for Public Service report explains why the federal government faces a slew of problems in hiring and retaining IT security professionals. It also proposes initiatives to boost the government's cybersecurity workforce. Read more...

  • Article

    Cloud Security Certification Launched

    Designed to Measure Advanced Competence By Geetha Nandikotkur
    Cloud Security Certification Launched

    (ISC)² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?

  • Article

    Adopting the Cybersecurity Framework

    Interview with Unisys CISO David Frymier By Eric Chabrow
    Adopting the Cybersecurity Framework

    David Frymier, the chief information security officer at Unisys, says the IT services company believes it will be a more secure company by adopting the federal cybersecurity framework.

  • Article

    Internet of Things: Legal Issues

    Attorney Stephen Wu on Impact of Increasing Computerization By Eric Chabrow
    Internet of Things: Legal Issues

    At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.

  • Blog

    RSA Conference 2015: Visual Journal

    Attendees Flock to Sessions, Tchotchkes, Selfie Sticks By Mathew Schwartz
    RSA Conference 2015: Visual Journal

    The buzz at RSA could be felt beyond the session rooms, not least in the Expo Hall, with demonstrations that tapped Google Cardboard and offered an array of enticing tchotchkes - including selfie sticks and sharks with laser pointers on their head.

  • Article

    Inside the Cybersecurity Nexus

    ISACA's Eddie Schwartz on New Strategies for Growing Skills By Tom Field
    Inside the Cybersecurity Nexus

    As a longtime security leader, Eddie Schwartz has felt acutely the pain of the security skills crisis. Now, as chair of ISACA's Cybersecurity Task Force, he's helping organizations do something about it.

More news...

Webinars

  • Securing the Brave New World of Online Patient Information

    Now that healthcare providers have spent large amounts of money for electronic health records (EHR), how will they keep the data secure from skilled, motivated criminals? A new focus by criminals on...

  • PREMIUM MEMBER EXCLUSIVE

    Insider Fraud Detection: The Appliance of Science

    See the startling results of meticulous analysis of hundreds of real-life insider attacks from the team at Carnegie Mellon University, where the CERT (Computer Emergency Response Team) function was...

More webinars...

White Papers

More whitepapers...
ARTICLE Cyber Espionage Alert: Business Risk?

A team of hackers has been operating since at least 2001, wielding malware that even today is among...

Latest Tweets and Mentions

ARTICLE Cyber Espionage Alert: Business Risk?

A team of hackers has been operating since at least 2001, wielding malware that even today is among...

The ISMG Network