Sen. Joseph Lieberman all but concedes the Cybersecurity Act he's sponsoring won't get enacted, and urges President Obama to issue an executive order to develop security standards that can be voluntarily adopted by the critical infrastructure owners.
The latest updates to the federal tally of major health information breaches confirm that the loss or theft of unencrypted devices continues to plague the industry. Learn all the latest details.
The guidance discusses methods, techniques and best practices for the sanitization of target data on different media types and risk-based approaches organizations can apply to establish and maintain a media sanitization program.
Five pilot projects unveiled by the federal government, if successful, should build trust in online commerce, helping to boost the economy, says Jeremy Grant, head of the National Strategy for Trusted Identities in Cyberspace National Program office.
The CISO of Beth Israel Deaconess Medical Center calls on the Food and Drug Administration to take bold action to help ensure the security of medical devices, which are vulnerable to malware.
The new report aims to help access-control experts improve their evaluation of the highest security access-control systems by discussing the administration, enforcement, performance and support properties of mechanisms that are embedded in each system.
Budgets are a big issue today for those managing their risk management frameworks, says NIST's Ron Ross, who offers his advice on using cloud as a means to save money and improve IT infrastructure.
Sen. Jay Rockefeller, in a letter to Fortune 500 company CEOs, queries them about their businesses' IT security practices and wonders if they agree with efforts by the U.S. Chamber of Commerce to block a vote on the Cybersecurity Act of 2012.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
In the past, just writing "privacy pro" on a business card could get you into the field. "That's not the case today," says the IAPP's Trevor Hughes, who details today's challenges for privacy professionals.
When it comes to cybersecurity in Delaware, Gov. Jack Markell sees his job as being the state's head cheerleader. In an interview, Markell discusses his role and the state's cybersecurity accomplishments.
CISOs shouldn't be tied too closely to specific guidance and processes when new threats emerge or their organization has suffered a breach, says RSA CISO Eddie Schwartz.
Among Patricia Titus' first priorities as CISO at Symantec: re-focusing the company's security team. One year later, find out how she developed a broader-thinking unit with a new view on security.
"With the increasing breadth and depth of cyberattacks ... risk assessments provide important information to guide and inform the selection of appropriate defensive measures so organizations can respond effectively," guidance coauthor Ron Ross says.
Too many organizations misunderstand exactly what continuous monitoring is, says Centrify's Matt Hur, who offers insights on how to deploy continuous monitoring solutions for the best results.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.