The market for cyber liability insurance has been around for over a decade, but only recently has it experienced a spike in demand. The variety of recent high-profile data breaches have cast light on the importance of having coverage should a cyber-attack strike a business. No business is immune to a cyber-attack,...
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
Are you heading to RSA Conference 2015 in San Francisco? If so, be sure to connect with Information Security Media Group. We'll be out in full force on the Expo floor, as well as running a number of must-attend sessions and events.
A new Partnership for Public Service report explains why the federal government faces a slew of problems in hiring and retaining IT security professionals. It also proposes initiatives to boost the government's cybersecurity workforce.
Leaders and top practitioners from numerous federal government agencies will transplant themselves to San Francisco this coming week to share their knowledge on a wide range of topics at RSA Conference 2015.
Collaboration is a critical investment for many organizations looking to drive competitive advantage by better arming knowledge workers with information, access to expertise, and the ability to act collectively on trusted content. Forrester data shows that over 50% of organizations have implemented or are expanding...
The dynamics of the world economy and the demands on governments at all levels put increasing pressure on organizations to reduce costs while seeking new opportunities to grow and differentiate their products and services. The pervasiveness of the Internet and mobile devices is fostering multi-channel customer...
The pursuit of creating competitive differentiation and accomplishing desired outcomes, such as adding incremental value to the business, is top of mind for most organizations-both for profit and non profit. Aberdeen surveyed 585 organizations across the world as part of its September 2013 Aberdeen Business Review...
When you look at how companies value themselves and their assets over the past few decades, there's been a dramatic shift - away from a position in 1975 where the majority of company value came from tangible assets like stock, plant and machinery, facilities and so on; to the situation we have now where the majority...
Capture. This single word has gained much notoriety in recent years. The reason: the importance of capture to business processes. In particular, the notion of capturing - scanning - paper based information as early in a process as possible for a couple of reasons. The first reason is to eliminate the chance of the...
Understanding the organization's maturity level as defined in the CGOC Information Economics Process Assessment Kit is a major step forward in the journey toward achieving real information economic balance. The next is defining the requirements for a robust information lifecycle governance (ILG) solution and any...
No one intentionally creates digital debris. We document as we collaborate; we create files, backups, databases, and applications; and we store photos, music, digital training programs, logs, and reports. We create that content at that moment imbue it with value and purpose. However, as circumstances evolve,...
Banking is undergoing a massive shift that began with the automated teller machine, continued with online banking, and is now accelerating with the advent of mobile computing. It wasn't that long ago that banking customers were limited to the branch on Main Street. Teller services were confined to the 10 a.m. to 3...
Financial services firms are facing a new set of challenges and risks. In an increasingly global, mobile and connected world, customers can come from anywhere and they can leave in a heartbeat. But they are also interested in consolidating their banking wherever possible, and they expect the companies with whom they...
For years, security leaders have struggled to find the balance between ensuring strong security and maintaining customer convenience. Benjamin Wyrick of VASCO Data Security says mobility may be the answer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.