"There's a real threat out there." Cybersecurity Coordinator Howard Schmidt says. "But the threat sort of follows the way we build our defenses against it, and I think those things continue to move in parallel."
Cybersecurity reform was part of a defense bill that included a provision to repeal a law that bar gays from serving openly in the military. Supporters couldn't muster the support to bring a Senate vote on the bill.
Understanding the contact versus contactless variables for an implementation of EMV in U.S. is the first step, says Smart Card Alliance's executive director.
Unfettered access to state data "is the kind of stuff that causes me to lose sleep at night," Delaware CSO Elayne Starkey says, in explaining new, stringent rules to let employees use their own smart phones to access state networks.
"Where mobile payments are concerned, I don't want to say banks will be taken to the cleaners, but I think that's where their biggest threat is," says Avivah Litan of Gartner.
How can you recognize the intent of your colleague and perhaps prevent him from manifesting as a true insider threat? Blogger Upasana Gupta provides the answer.
When Southwest Washington Medical Center in Vancouver, Wash., introduced free wireless Internet access for patients and guests, it used a "defense-in-depth" strategy to address security issues, says Christopher Paidhrin, IT security compliance officer.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.