Information sharing proved critical during the recent wave of DDoS attacks that hit leading U.S. banks. What lessons does the experience offer for organizations in other industries? Experts weigh in.
From point-of-sale hacks to malware and DDoS attacks, the top cyberthreats of 2012 have been aggressive and strong. Is it time for organizations to adopt a "hack back" strategy against perceived attackers?
The individual implementing security - the chief information officer - can't be the same as the person responsible for testing security, conducting audit and reporting on security weaknesses, South Carolina Inspector General Patrick Maley says.
Two new reports re-confirm that healthcare organizations are experiencing expensive data breaches, many of which could have been prevented by taking specific steps.
In this week's breach roundup, read about the latest incidents, including a storage system vulnerability affecting 235,000 state university students and a stolen laptop at a home healthcare service.
Information sharing is key. The more we share about attacks - vulnerabilities and vectors - the more we will learn about how the attacks are waged, who's behind them and what they're after.
The leaders in Congress on cybersecurity matters are the chairs of the committees that have jurisdiction over IT security. In both houses, chairmanship changes mean new lawmakers will lead legislative initiatives on cybersecurity in the 113th Congress.
The recent wave of DDoS attacks against top U.S. banks is a wake-up call for organizations that are ill-prepared to fight against such an attack. NIST's Matthew Scholl offers strategies to mitigate the threat.
Developing a bring-your-own-device
policy that's well-integrated with an organization's overall information security strategy requires a multi-disciplinary, collaborative approach, says attorney Stephen Wu.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
What are the key skills and tools forensics pros use in probing a data breach? What can we learn from recent breaches? Rob Lee of SANS Institute walks us through a typical forensics investigation.
A report released by Gov. Nikki Haley says the hacker obtained the password when an employee of the Department of Revenue opened an e-mail containing malicious computer code.
The goal is admirable: Eliminate all traces of online information about an individual if that's what he or she wants. But is the right to be forgotten an impossible dream?
As missiles and bombs do real damage in Israel and Gaza, a veteran Israeli cybersecurity expert, Amichai Shulman, downplays the significance of the assaults waged against Israeli websites, contending any damage has been minimal.
NASA is ramping up efforts to encrypt all laptops following the recent theft of one containing sensitive personal information. Find out more about the U.S. space agency's encryption plans.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.