Enterprises need to think beyond malware, breaches and insider threats when assessing information security. Keeping hardware up and running - available - is a crucial aspect of securing essential data.
A new audit and assurance program from ISACA aims to help organizations deal with the current patchwork of European cybersecurity rules and regulations, including an increased demand for greater online attack resilience.
White House Cybersecurity Coordinator Michael Daniel is under fire for perceived 'bragging' about his lack of technical expertise. But was Daniel, in fact, bragging? And is he off base in saying his job doesn't require deep technical experience?
Cybersecurity experts raise doubts whether the National Security Agency has successfully deployed an automated hack-back system known as MonsterMind as revealed by former NSA contractor Edward Snowden.
The hacker community can be a cynical crowd, or perhaps a realistic one, that tries to make the best of the threats confronting society. CISO Dan Geer, for example, prefers to hire security folks who are, more than anything else, sadder but wiser.
Why is the National Institute of Standards and Technology developing new cybersecurity standards based on the same principles engineers use to build bridges and jetliners? NIST's Ron Ross explains.
Is having too many stakeholders who care about cyberspace's viability a hindrance to security? That's one way to interpret comments from White House Cybersecurity Coordinator Michael Daniel as he addresses the challenges of governing the Internet.
In the same week that the new National Security Agency director spoke measuredly about the cybersecurity threat, his predecessor sounded the alarm about the calamitous dangers lurking in cyberspace.
Under assault by advanced threats, organizations must change their approach, says Damballa's Stephen Newman. Detection is out; response is in. How do organizations deal with 'a constant state of infection?'
The FFIEC has started its cybersecurity assessment pilot program, which will examine more than 500 community institutions. The council has also launched a Web page dedicated to cybersecurity.
The U.S. federal government's top telecommunications regulator is proposing a "new regulatory paradigm" by calling on communications providers to step up and assume new responsibilities to manage cyber-risks.
We've been talking about shifting away from legacy mag-stripe technology and a move toward EMV chip cards for the last decade in the U.S. So is it too late, or is there still hope for EMV?
The Department of Homeland Security hasn't done enough to secure the IT systems that manage American ports, which could restrict the flow of commerce, Congressional auditors say in a new report.
New guidance from NIST is aimed at helping federal agencies transition from a 14-year-old requirement to a new process that will assure continuously the security of their IT systems.
A George Mason University researcher says NIST's cybersecurity framework is likely to cause more problems than it solves. Instead, he encourages critical infrastructure operators to adopt dynamic cybersecurity provisions.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.