Nearly 70% of the weaknesses and deficiencies in the IRS's IT systems remain unresolved one year after being identified, jeopardizing the confidentiality, integrity and availability of sensitive taxpayer information.
Melissa Hathaway helped create the Comprehensive National Cybersecurity Initiative in the Bush White House, and vetted it when she led Obama's cyberspace policy review. Now, she reveals whether it was wise to release a declassified CNCI version.
Cloud computing won't balance state government budgets; it won't even put a dent in the fiscal shortfall. Still, as states look at every opportunity to cut costs, the potential savings of secure cloud computing presents seem enormous.
Ghosts of Crimes Past and Present Will Haunt the Future of Banking Institutions and Customers
"The more things change, the more things stay the same." This old saying holds true when it comes to the different types of fraud hitting financial institutions.
In 2009, institutions were hit from every angle with...
A consortium of 30 international cybersecurity organizations, in updating the 25 most dangerous programming errors, have proposed standard contract language that would hold software vendors liable for programming errors.
The number of identity fraud victims increased 12 percent to 11.1 million people in 2009 -- the second consecutive annual increase. At the same time, the total amount of fraud also increased by 12.5 percent to $54 billion.
These are the headlines of the newly-released 2010 Identity Fraud Study by Javelin Strategy &...
The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
Khalid Kark, vice president at Forrester Research, recently wrote an in-depth report on healthcare information security in which he described five key principles.
In an interview, Kark discusses each principle, including:
Take a risk-based approach and look beyond regulatory compliance, focusing instead on...
David Matthews, Deputy Chief Information Security Officer, City of Seattle
The hack on Gmail e-mail accounts of activists promoting human rights emanating from China is a reminder to government officials about the security and privacy threats cloud computing - Gmail is a cloud computing offering from Google -...