C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Insider fraud;
Application security;
Cloud computing.
Axelrod is currently executive advisor for the Financial...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
The recent news that Nexus One smartphone owners were unable to send or receive data is just a precursor to what security experts say is the next big threat to mobile phones and services - mobile malware.
According to Dr. Markus Jakobsson, a noted security expert in the field of phishing and crimeware, mobile...
At least two banking institutions have posted messages on their websites, alerting members to be wary of a bogus application distributed on mobile phone platforms.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
Northrop Grumman Corporation has invited three of the nation's leading research institutions to join a Cybersecurity Research Consortium to advance research in this field.
Cybersecurity, forensics, risk management -- what will be the core security skills needed in organizations in 2010?
In an exclusive interview, Kent Anderson, founder and managing director of Encurve LLC, as well as a member of ISACA's Security Management Committee, discusses:
The core security skills now needed...
What have been the biggest privacy issues of 2009, and what emerging trends should you watch heading into 2010?
We posed these questions to J. Trevor Hughes, Executive Director of the International Association of Privacy Professionals (IAPP). In an exclusive interview, Hughes discusses:
The role of the...
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
The proliferation of smaller devices including advanced personal digital assistants, ultra-portable personal computers and high-speed cellular networks has made portable biometric systems a reality.
Georgia Tech professor sees computers with wireless connections as likely furnishing unprecedented opportunities for criminals, hackers, terrorists, spies and other unsavory actors.
For the second time in four months, the Commonwealth of Massachusetts has pushed back the implementation of its new data protection law - one of the toughest in the nation.
Yet even with the new deadline of January 2010, many of the businesses impacted by these stringent data protection requirements won't be...
The number of identity fraud victims has increased 22 percent in the U.S., costing 9.9 million victims a total of $48 billion in 2008.
This is the news from the fifth annual Identity Fraud Survey Report from Javelin Strategy & Research. In an exclusive interview, James Van Dyke, Javelin founder and President,...
Reported data breaches increased by nearly half in 2008, and 12 percent of the total hacks were at financial institutions - up from 7 percent in 2007.
This is the news from the Identity Theft Resource Center's (ITRC) 2008 breach report, which shows that 2008's 656 reported breaches were up 47 percent over 2007's...
Sahba Kazerooni is a senior security consultant with Security Compass, a security consulting and training firm specializing in application security based in New Jersey. He is also an internationally-renowned speaker on security topics, and has provided presentations at security conferences around the world, including...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.