"You need to understand how you are currently using social media in your organization, and how you intend to use it, before you can define policies around social media," says Erika Del Giudice of Crowe Horwath.
The nascent field of cyber intelligence addresses threats that originate anonymously within cyberspace with potentially enormous consequences: physical destruction and economic chaos.
Government officials have confirmed a potential threat by al-Qaida against the United States as the nation approaches the 10th anniversary of the Sept.11, 2001 terrorist attacks that hit the World Trade Center and Pentagon.
Comptroller General Gene Dodaro uses the approaching 10th anniversary of the Sept. 11 terrorists attacks to assess the progress DHS made in implementing its security missions, including cybersecurity.
If you feel strongly about the need to protect the privacy of patient information that's used to support research, you've got some extra time to submit your ideas to federal regulators.
Executives in a variety of industries who are in charge of securing their enterprises' IT say they're more anxious about outsiders hacking into their systems than insiders - either maliciously or inadvertently - threatening their digital assets, a new survey shows.
A repentant SparkyBlaze wants to go legit, leaving behind the hacktivism he helped foster as a member of Anonymous and start a career in the U.S. as a ethical hacker. As proof, he's offering advice to protect IT from hackers.
As the Department of Veterans Affairs moves forward with plans to allow physicians and others to use Apple's iPads and iPhones, its CIO has scrapped his laptop for a tablet.
The Finnish security provider F-Secure concludes the attack e-mail doesn't look too complicated. In fact, it's very simple. But the exploit inside Excel was a zero-day attack at the time and RSA couldn't have protected against it by patching its systems.
We're pleased that two members of Congress have asked the Government Accountability Office to study whether federal regulators are adequately addressing the security risks involved in using wireless medical devices.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.