Is there an ideal message a senior executive can deliver amidst breach response? The recent breach of Global Payments Inc. and the subsequent CEO's response to the incident raise this question.
According to our new survey, more than half of banking institutions expect an increase in fraud-fighting resources this year. But how are they investing those resources? The answers may surprise you.
"Regulation drives spending," says George Tubin of GT Advisors. "You're in a situation where the regulators are telling you, 'You have to do something; you have to make improvements.' Therefore, the bank has to spend some money on technology."
Delaware Chief Security Officer Elayne Starkey offers her insight into the security challenges organizations face with two of IT's most popular trends: mobile device use and cloud computing.
One problem tracking IT security employment is the dearth of information. Even the most trustworthy organization in collecting employment data, the Bureau of Labor Statistics, furnishes infosec data it cautions aren't reliable.
Ignorance is not bliss. Two new studies, when viewed together, show that consumers' ignorance of the consequences of their actions coupled with enterprises' unawareness of their computing environment equal unacceptable risk.
The cost of a data breach is down, say the latest Ponemon Institute study. But as the Global Payments breach shows, organizations still have many reasons to be concerned, says researcher Larry Ponemon.
Cloud services are being adopted increasingly by organizations. But with adoption comes increased concern, says Symantec's Francis deSouza. How can organizations deploy cloud security to protect their data?
Performing a job effectively most of the time doesn't cut it in IT security, as the Internal Revenue Service is being reminded by Treasury Department auditors.
Should you accept a Facebook friend request from your boss? And if you don't accept the invitation, could that decision possibly hurt your career? I asked our advisers, who offer thoughtful insights.
Creating a more trusted Internet ecosystem should help all types of enterprises and leaders implement identity management solutions that extend beyond usernames and passwords, White House Cybersecurity Coordinator Howard Schmidt says.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.