Legislation to give the federal government authority to share classified cyber-threat information with approved American companies was introduced in the Congress by the chairman and ranking member of the House Intelligence Committee.
We all know the online shopping risks consumers face on CyberMonday. But how does the BYOD mobile computing trend impact risks to organizations from their own employees shopping on the job?
NICE's Ernest McDuffie says a proposed cybersecurity workforce framework represents a consensus of government thought on how best to define the jobs, skills and tasks needed to secure information technology.
The arrest of six international suspects is being touted as one of the biggest Internet crime takedowns in history. But how much of a deterrent will Operation Ghost Click be for other cybercriminals?
The bust of six Estonians for one of the biggest online frauds ever is reminiscent of another type of organized crime: drugs. Despite the similarities, there's one big difference between drugs and online crimes.
IT security practitioners should understand why the bits, bytes and network connections - the technologies - are important to their organization's goals. Ignorance of the mission, for IT security folks, isn't bliss.
ISACA has just released a new study about the top vulnerabilities of Web applications. And, according to Sarb Sembhi, the results of this survey just might surprise you.
Harry Raduege sees the nascent field of cyber intelligence as a way for governments and businesses to be proactive, and not reactive, to today's sophisticated digital threats.
The statement mailing error that affected thousands of Wells customers easily could have been avoided. The mishap is pretty easy to pinpoint: Checks and balances, no pun intended, were not in effect.
CIOs and CISOs face the overwhelming mission of safeguarding systems and data while fiscal shortfalls force significant consolidation and reengineering of IT programs and services.
Occupy supporters plan today to protest at several banks' headquarters in NYC. Coming on the heels of cyberattacks that targeted police in Boston, how worried should banks be about growing physical threats and cyberattacks waged by Occupy sympathizers?
Many organizations have the expertise required to implement cyber intelligence but have yet to learn how to integrate those skill sets into an effective, end-to-end process, says Intelligence and National Security Alliance's Terry Roberts.
A hacker anywhere in the world could easily track the whereabouts and file-sharing habits of a Skype user and use the information for purposes of stalking, blackmail or fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.