As the remnants of Hurricane Sandy move north and west, IT security leaders and staff help pull together resources to make sure key systems remain available and secure.
Kris Rowley feels she can take Sandy's punch. Having survived the battering Irene gave Vermont in 2011, the state's CISO knows how better to defend state IT as the remnants of Hurricane Sandy take aim at the Green Mountain State.
How should organizations considering cyber insurance start the process? Cyber liability lawyer Richard Bortnick offers three steps in determining the type of cyber liability coverage they should seek.
Defending Delaware's critical infrastructure is a top challenge since a large part is owned by the private sector, says State Homeland Security Adviser Kurt Reuther, who details the challenges.
Distributed-denial-of-service attacks on U.S. banking institutions will continue, says Akamai's Mike Smith. And he believes the attackers aren't out just to embarrass the banks, but to commit fraud.
President Obama has not yet reviewed the draft of a proposed executive order to create a process to establish IT security best practices that private owners of critical infrastructure could voluntarily adopt, DHS Secretary Janet Napolitano says.
A group of highly respected IT security thought leaders is calling on the Obama administration to exercise existing powers to strengthen the processes the federal government employs to secure its information systems.
Top executives must be transparent with their stakeholders when their IT systems get attacked. Otherwise, their enterprises' reputations could be more severely damaged, says IBM Fellow Luba Cherbakov.
The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
The biggest social media concern for risk managers is the potential reputational impact to the organization, says risk expert David Bradford, who outlines mitigation steps.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
Healthcare providers often fail to conduct comprehensive, timely risk assessments, as required by regulators. But security expert Kate Borten says they can leverage new guidance to help get the job done.
RSA says 30 U.S. banks are potential targets of a massive Trojan attack, and alleged hacktivists say three more institutions will be hit by DDoS attacks this week. How must banks respond to the latest threats?
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.
As the overall number of "true exploits" have decreased, targeted ones - especially those initiated by criminals or nation states - are becoming harder to detect, say Rick Miller, director of IBM Managed Security Services.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.