When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
This week's top news and views: IT employment ends 2010 near a two-year high; IT security jobs are on the rise in 2011; and giving non-IT executives the responsibility for IT risk.
Philip Andreae was there when EMV was born, and he plans to see the EMV evolution through, until it becomes a global standard embraced throughout the world.
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
When it comes to sizing up the privacy agenda for 2011, the tone at the top of organizations is all about improving data security, says privacy expert and lawyer Lisa Sotto.
This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
This month's most compelling news and views: top 10 government IT security stories of 2010, four components on the insider threat, pragmatic optimist Howard Schmidt and failure to enact major cybersecurity bill foreseen. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
Dmitri Alperovitch, McAfee Labs threat research vice president, discusses the company's annual threat predictions, saying: "We are seeing an escalating threat landscape in 2011."
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.