Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
"We want to make sure that critical new threat area that we're building a foundation of cooperation with our oldest ally as we tackle the critical challenges that cyber security poses," William Lynn says.
Former FBI CIO Zal Azmi, Senior Vice President, CACI International
Attacks from China on Google and other corporate IT infrastructures just scratch the surface in regards to infiltration into America's critical information systems and networks, the former chief information officer of the Federal Bureau of...
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
The final installment of our five-part series on this year's top five federal cybersecurity challenges tackles the growing role the National Institute of Standards and Technology performs in securing government IT.
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
The fourth installment of our five-part series on this year's top five federal cybersecurity challenges looks at the information security implications of cloud computing, which is being championed by Federal CIO Vivek Kundra.
Credit reports, social networks and international background checks - these are three of the hottest topics in employment background screening, according to Employment Screening Resources (ESR), a CA-based firm.
In an exclusive interview, Lester Rosen, President and CEO of ESR, discusses:
The top 10 trends in...
You've heard of Stephen Covey's "The Seven Habits of Highly Effective People?"
Well, information security leaders also must cultivate healthy habits to proactively manage their careers. Following are the 8 essential habits identified by successful security leaders: