Former FBI CIO Zal Azmi, CACI International Senior Vice President for Global Strategic Law Enforcement and National
Just as spy agencies have intelligence analysts, the government needs to develop technically savvy cyber analysts as IT threats from foreign nations and criminal organizations grow, says a former...
In the Crossfire: Critical Infrastructure in the Age of Cyberwar, the survey of 600 IT and security executives from 14 countries, reveals which country - China, Russia or the U.S. - is most likely to launch a cyber attack against foreign digital assets.
With Howard Schmidt's appointment as national cybersecurity coordinator, his role as president of the Information Systems Security Association (ISSA) has been filled by Kevin Richards, a risk management advisor with Crowe Horwath.
In an exclusive interview, Richards discusses:
Top agenda items for ISSA in...
Former FBI CIO Zal Azmi, Senior Vice President, CACI International
Attacks from China on Google and other corporate IT infrastructures just scratch the surface in regards to infiltration into America's critical information systems and networks, the former chief information officer of the Federal Bureau of...
Risk management today - it's less about pure technology, more about business acumen and pure communication skills.
This is the position of Kenneth Newman, VP & Information Security Manager at Central Pacific Bank. In an interview about top risk management trends, Newman discusses:
Scope of the risk management...
What's the cost of a data breach?
The Ponemon Institute is out with its 5th annual "Cost of a Data Breach" study, and in an exclusive interview Dr. Larry Ponemon discusses:
The current cost of a data breach - and how it's risen since 2009;
Data breach trends across industry;
What organizations should do to...
The Advanced Persistent Threat - what exactly is it, and how are organizations vulnerable?
Ron Gula, CEO of Tenable Network Security, explains the threat and the challenges to mitigating it. In an exclusive interview, Gula discusses:
Why some organizations are especially vulnerable;
Strategies and solutions...
It is time to address the issue of protecting our identity and thanks to the federal government's implementation of PIV smart card credentials; we have a proven technology in place that could be leveraged for a much broader audience.
The call to aid the devastated country of Haiti came just hours after a 7.0 earthquake hit the impoverished Caribbean island on Tuesday.
Just as quickly as the tweets came in asking for donations, so too came the cyber criminals looking to divert funds from legitimate charities to their own pockets.