Mobility has quickly evolved from being a "project" to an enterprise platform. What are the key security and privacy considerations when managing enterprise mobility? Good Technology CTO Nicko van Someren shares insight.
A new report says the Department of Health and Human Services has several security weaknesses that may have contributed to five recent data breaches. But are other healthcare entities guilty of the same mistakes?
With the federal government clearly in the bullseye of hackers, the Department of Veterans Affairs is revamping its cybersecurity strategy under its new CIO, LaVerne Council, who took over the job last month.
Neiman Marcus has asked a federal court to reconsider its decision to allow a consumer class-action suit to go to trial. If the retailer fails, legal experts say, it could mean a costly setback for breached entities.
U.S. officials say Russians coordinated an attack on an unclassified Pentagon email system used by the Joint Chiefs of Staff that's been offline since late July, according to NBC News.
Enough talk about the cybersecurity skills gap; it's time for a new strategy for filling it, says ISACA's Eddie Schwartz. The new CSX Practitioner certification is a step in the right direction, he says.
Attributing who's behind cyberattacks is essential because it helps organizations build better defenses against future attacks, says Greg Kesner, former chief of the Federal Bureau of Investigation's Data Intercept program.
The Black Hat conference features presentations that have already led to very public warnings about remotely hackable flaws in everything from Jeep Cherokees and Linux-powered rifles to Android mobile devices and Mac OS X.
Health data breach statistics for 2015 are stunning. So far this year, just the top five breaches have impacted 99.3 million individuals. And all five involved hacker attacks. Security experts discuss what's going on - and what can be done to mitigate the risks.
"Defend everything" is not working. And as attacks get more sophisticated, attackers are innovating in ways that challenge organizations shackled by legacy security strategies, says FireEye's Bryce Boland.
Georgia Tech researchers are attempting to develop new processes and technologies to more easily detect malware. The goal, researcher Wenke Lee explains, is to find an effective way to identify and expunge advanced persistent threats
The 30-day Cybersecurity Sprint overseen by Federal CIO Tony Scott has crossed the finish line, but in reality, it looks more like a starting gate to a marathon to get the federal government to secure its battered IT.
As a result of a continuing investigation, the estimated number of organizations affected by a recent cyberattack on Web-based electronic health records vendor Medical Informatics Engineering and its personal health records subsidiary, NoMoreClipBoard, has ballooned.
The toolbar distributed by Chinese-language search engine Baidu is being targeted by opportunistic attackers and used to exfiltrate corporate secrets, warns Rob Eggebrecht, president and CEO of the security firm InteliSecure.
An NSA map that shows nearly 700 cyber-assaults on computers at American military installations, government agencies, businesses and educational institutions raises the question of whether the e-spy agency should have shared some of that information.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.