Nonstop data breach notifications take a psychological toll, driving executives and consumers alike to alter their behavior for the worse. Here are three ways for businesses to battle data breach fatigue.
In the latest move in the battle between LabMD and the Federal Trade Commission, the medical testing firm has asked an FTC judge to sanction FTC, including dismissing the data security case against the lab.
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind as revealed by former NSA contractor Edward Snowden.
In June, U.S. Senate finance committee leaders asked 100 healthcare sector stakeholders for new ideas about enhancing healthcare data and protecting patient privacy. Here's what these groups said.
The killing of an unarmed teen by police in Ferguson, Mo., has Anonymous sympathizers disagreeing on Twitter when and how to expose the identity of the shooter.
Internet hygiene is not up to par, say cybersecurity experts Tom Kellermann and Rod Rasmussen, who explain why bad hygiene has led to increased botnet traffic and malware infections.
The U.S. Department of Veterans Affairs has launched a new security awareness campaign to help veterans prevent, detect and respond to identity theft. VA CISO Stan Lowe offers details about the program.
DHS could do a better job getting critical infrastructure operators to participate in its Enhanced Cybersecurity Service program. As of March, only three of the 16 sectors participated in the initiative.
With lessons learned from the misfired launch of HealthCare.gov, the Obama administration is offering expert help - including security and privacy tips - to other federal agencies for their IT rollouts.
Identity fraud is one of consumers' most feared crimes, and at banks those schemes translate into application fraud. FICO's Adam Davies discusses today's common application fraud scams and how to stop them.
Detecting and preventing advanced attacks isn't just a technology issue - it's a business risk that needs to be elevated to the highest levels of an organization. Trend Micro's Tom Kellermann shares strategies.
Finding a common theme from the Black Hat USA conference isn't easy, but a few emerged - simplifying complexity and developing community-based solutions - from sessions and discussions with top cybersecurity experts.
With the explosion of consumer fitness devices and health-related apps, Sen. Charles Schumer, D-N.Y. wants the Federal Trade Commission to push the vendors of those products to adopt new privacy safeguards.
Cyber-historian Jason Healey contends the U.S. government does not want peace in cyberspace so it can conduct more attacks and exploitations. Instead, he says the feds should make the Internet's economic benefits its top priority.
No question, the information security community - and all of us at ISMG -- lost a friend with the untimely death of Terry Austin, CEO and President of Guardian Analytics.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.