When a database breach occurs, consumer notification continues to be a public problem, and it's time for the federal government to step in, says Linda Foley, co-founder of the non-profit Identity Theft Resource Center.
Executives deal with risk all of the time, except that is, information technology risk. For many non-IT leaders in government and business, IT risk is outside their comfort zone. Oregon CISO Theresa Masse wants to change that.
This week's top news and views: Conscripting cybersecurity experts to protect IT, State battles data leakage and President Obama signs bill to reorganize the National Institute of Standards and Technology.
Researchers explore adapting geolocation technology to identify where data reside on the cloud so organizations can comply with IT security laws and regulations, RSA Chief Technology Officer Bret Hartman says.
This month's most compelling news and views: top 10 government IT security stories of 2010, four components on the insider threat, pragmatic optimist Howard Schmidt and failure to enact major cybersecurity bill foreseen. And don't miss our audio week-in-review podcast by Executive Editor Eric Chabrow
"The environment that started by supporting whistleblowers ... is essentially morphing into 'Gee, we as an organization need to be completely transparent, whether we want to or not,'" says Cal Slemp, managing director of Protiviti.
Thwarting the insider threat entails more than knowing an individual with access to a computer, but to recognize the synergy between the individual, organization, technology and environment, I3P Research Director Shari Lawrence Pfleeger says.