Why are breaches in the payments arena so difficult to trace and investigate? Verizon breach investigator Dave Ostertag offers insights about the forensics complexities of a processor breach.
A federal audit has verified that the Department of Veterans Affairs is complying with federal encryption requirements in its initial use of iPhones and iPads even though the devices lack the required type of hardware encryption.
Israel's intelligence agency supervises commercial banks' IT systems because they're considered part of the critical national infrastructure, and that's okay with the bankers. See why.
Flame is designed to carry out cyber espionage and steal valuable information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and audio conversations.
What are the top four malware-related issues that all organizations should focus on this year? Andreas Baumhof of ThreatMetrix shares insights based on five years of malware analysis.
The proliferation of botnets and malware in cyberspace threatens to undermine the efficiencies, innovation and economic growth of the Internet and diminishes the trust and confidence of online users.
Many organizations aren't devoting enough resources to ensure that applications for mobile devices are secure, says security expert Jeff Williams. He offers five tips for adequately addressing mobile application security.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?
Mobile is the right way to go for federal agencies. But the transition is tougher for the government than for the consumer - and with security and privacy on the line, there's no margin for error.
By understanding the motivations behind hacktivism, organizations can learn why good public relations can play an important role in thwarting attacks or minimizing their impact.
It's been six years since the Department of Veterans Affairs experienced a huge breach. What breach-prevention steps has the VA taken since then, and what's left to be done?
Cloud services contracts often provide little to no wiggle room. What steps do organizations need to take before signing any contract? IT security lawyer Françoise Gilbert offers some key strategies.
Why are socially engineered schemes causing so many headaches? Symantec's new Internet Security Threat Report shows attacks are growing. Here's a list of Symantec's recommendations to thwart risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.