Jason Clark, CSO of Websense, has met recently with 400 CSOs. In a pre-RSA Conference interview, he discusses how security leaders can be more effective when facing mobile security and other challenges.
Getting forensics help should be one of the first steps an organization takes after a breach occurs, says IT security and privacy lawyer Miriam Wugmeister.
RSA Chief Technologist Sam Curry defends the company's approach to public-key cryptography after researchers suggest a flaw in its encryption algorithm, contending the problem exists elsewhere in the security chain.
"As an employee of a local government information security organization ... I implore you to consider a new approach to our joint efforts to secure information infrastructure."
To build an effective information security program, organizations and leaders need to take seven essential steps, including updating a risk assessment, says consultant Tom Walsh.
The latest blogosphere commentary comes from DHS Deputy Secretary Jane Holl Lute, who touts President Obama's legislative agenda and emphasizes cooperation between government and business in safeguarding America's IT assets.
Up to now, business and government have not paid much attention to hacktivists. But that's got to change. In fact, cybersecurity threats waged by hacktivists pose increasing concern.
Anonymous and associated hacking groups have been attacking police departments and associations over the past week, disrupting access to official websites and leaking certain information.
The concept of time supported dueling views, presented at a congressional hearing, on the need for more stringent government regulations to protect the nation's critical information infrastructure.
In the wake of the latest hacktivist attacks against high-profile institutions, industry experts offer these tips to bolster online security, customer awareness and the corporate image.
Two of the American government's most IT-security sensitive organizations - the Army and National Security Agency - are looking for ways to employ smartphones to access selected IT systems.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.