Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber warfare.
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Malware is increasingly sophisticated, and social media are the common new venues for attacks.
These are the headlines from the latest Cisco Annual Security Report. Patrick Peterson, Cisco senior fellow, offers highlights of the report, discussing:
Top trends and threats;
The risks to specific vertical...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
Interview with Jay Foley of the Identity Theft Resource
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010.
This is the warning from Jay Foley, executive director of the Identity Theft Resource Center. In an exclusive...
Interview with Wade Baker and Alex Hutton of Verizon Business
Earlier this year, Verizon Business unveiled its much-heralded 2009 Data Breach Investigations Report.
Now, the company has just released its 2009 Supplemental Data Breach Report, which reveals the 15 most common attacks against organizations.
In...
Government agencies at all levels (federal, state and local) face unprecedented IT security threats from an increasingly organized and well-funded community of cybercriminals. Add stringent regulatory requirements to this and government agencies are faced with a daunting task of managing risk and adhering to...
FaceBook, Twitter, LinkedIn -- Social-networking sites are now used both as recruitment tools for new talent and as screening sites for potential employees. As such, information security professionals should be careful to cultivate the right image on these and other popular sites.
Government and business must think creatively to help safeguard America's digital assets, says Melissa Hathaway, the former White House acting senior director for cybersecurity who led President Obama's 60-day cybersecurity policy review.
Hathaway, an interview with GovInfoSecurity.com, cited the innovative...
Allan Bachman has fought fraud since the early 1970s, and he's seen the crimes evolve in both sophistication and scale.
In an exclusive interview, Bachman, Education Manager for the Association of Certified Fraud Examiners (ACFE), discusses:
The evolution of fraud schemes;
The most common types of fraud seen...
While external threats to corporate data have made headlines, an even greater threat is posed by company employees. Sometimes, employees accidently expose sensitive data to the public by losing valuable data stored on a USB drive or laptop that is lost or stolen. At other times, disgruntled laid-off employees may...
Federal rules now require institutions to manage their data so it can be produced quickly and completely if demanded by district court cases.
In this session Deputy CISO David Matthews will use his first-hand experience to provide your organization up to date information and documents on:
Compliance with Federal...
An international phishing operation was smashed on Wednesday by the US Federal Bureau of Investigation and law enforcement in Egypt.
The case called "Operation Phish Phry" has the largest number of defendants ever charged in a cyber crime case. A total of 53 people across the country and 47 people in Egypt were...
Months before announcing the Heartland Payment Systems (HPY) data breach, company CEO Robert Carr told industry analysts that the Payment Card Industry Data Security Standard (PCI DSS) was an insufficient protective measure.
This is the contention of a new master complaint filed in the class action suit against...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.