How Prepared Is Your Organization to Defend Against Today's Advanced Threats?
Ashley Madison, Sony, JPMorgan Chase - what's your confidence that when the next big security incident erupts, your organization will be prepared to defend itself? Are you getting the security you expect from the investment your...
The United States Coast Guard faces challenges in protecting the private information found in medical records of its personnel and their families, a Department of Homeland Security inspector general report says.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
The GAO says the Department of Homeland Security has failed to develop a strategy to secure computers in federal facilities that monitor and control building operations, opening a potential door to security breaches.
The Internet of Things brings many benefits, but it also brings with it new challenges: namely, the increased risk of cyber-attack. Our traditional concepts of cyber defense must evolve to keep pace. Join this session for expert insight on:
The convergence of IT and OT cybersecurity functions, as well as the...
As the federal government ramps up deployment of continuous monitoring, agencies should significantly reduce the time to certify and accredit IT systems and detect vulnerabilities, says the Defense Department's Robert Carey.
Conventional wisdom suggests China isn't interested in disabling industrial control systems in the U.S. After all, such an act would be against its own economic interest. But is that type of thinking right?
Will Pelgrin and Rich Licht of the Center for Internet Security see a strong link between cyber and physical security, and that has led to the creation of a new unit at the center to help local and state governments to secure both.
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
The gut feeling many people have about their physical security hasn't quite developed in the digital world, presenting a challenge for homeland security officials, says State of Delaware Homeland Security Adviser Kurt Reuther.
The IBM i server is one of the most secure and reliable business computers available today. But, no system is completely safe from the people who know how to access it. Organizations need to understand how to protect their critical systems and data from unauthorized access through common services such as ODBC, JDBC,...
"Cybersecurity remains a priority for my administration, and we are committed to protecting our critical infrastructure by taking decisive action against cyberthreats," President Obama says in a proclamation designating December Critical Infrastructure Protection Month.