Training that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
The new year's top trends in background screening can be summed up in two words: legal and compliance. Les Rosen of Employment Screening Resources offers expert tips for more effective screening.
House Majority Leader Eric Cantor plans to push new legislation aimed at bolstering the security of the HealthCare.gov website as part of a GOP call for "greater transparency" overall for Obamacare.
As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.
To help reduce reliance on passwords, the FIDO Alliance is developing standard technical specifications for advanced authentication. Michael Barrett and Daniel Almenara of FIDO describe the impact the effort could have in 2014.
The hacking of Skype's Twitter account, Facebook site and blog serves as a reminder that organizations must diligently protect their credentials, a cybersecurity expert says.
As a result of a settlement with the FTC tied to a 2011 health data breach, Accretive Health, a billing company, must take a series of security steps to better safeguard health information.
Leon Rodriguez, director of the HHS Office for Civil Rights, could leave the HIPAA enforcement agency to become the director of U.S. Citizenship and Immigration Services if his presidential nomination is formalized and he wins Senate approval.
Breach detection provider FireEye has acquired incident response and remediation services company Mandiant , forming a formidable company that can provide soup-to-nuts products and services to detect, mitigate and respond to breaches.
A second top-ranking official at the Centers for Medicare and Medicaid Services is departing in the wake of problems with the launch of HealthCare.gov, the website for Obamacare.
Days after a German newspaper reported that the NSA had compromised commercial computer hardware and smart phones for years, the agency says it, too, is concerned about the security of those products.
Buried deep within a 308-page report from a presidential panel on ways to tighten federal surveillance and IT security programs are important recommendations on how to mitigate the insider threat at federal agencies.
Three Democratic senators are calling for a hearing to examine whether stronger cybersecurity standards are needed to protect consumer data following a massive breach at Target that affected as many as 40 million debit and credit cards.
2014 may well be the "Year of Security," and IT security pros must prepare now for new job demands. ISACA's Robert Stroud offers five New Year's resolutions to help prepare for 2014's security trends.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.