Bruce McConnell, who just stepped down as one of the federal government's top cybersecurity policymakers, says he understands why some lawmakers don't trust DHS with significant authority to safeguard government IT.
As cyber patent lawsuits become more common in regulated industries, organizations should take steps to protect their patents and fight infringement claims, says attorney James Denaro, who offers insight.
Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
Hope springs eternal at the White House, at least when it comes to Congress passing meaningful cybersecurity legislation. Read about our exclusive conversation with a senior administration official.
Improper disposal of protected health information poses significant risks, as recent breach incidents demonstrate. That's why organizations need to do a better job vetting disposal companies and verifying that data or devices are actually destroyed.
What do TV's The Big Bang Theory, the computer game Call of Duty and traveling have in common? They're the top leisure pursuits enjoyed by IT security professionals. But what are other common attributes?
Farzad Mostashari's successor as leader of the Office of the National Coordinator for Health IT will have plenty of privacy and security issues to tackle, industry observers say. Find out what they say is on the to-do list.
The Centers for Medicare and Medicaid Services is cutting it close with deadlines to address the security risks of a project vital to new state health insurance exchanges slated to begin operations Oct. 1, a new report concludes.
Farzad Mostashari, M.D., who has championed programs of the HITECH Act over the last two years as national coordinator for health IT, announced Aug. 6 that he will be leaving his post in the fall.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
NSA Deputy Director John Inglis tells a Senate panel that the agency neither fired nor admonished any personnel in connection with the leak by Edward Snowden of details about top-secret intelligence-gathering programs.
A judge finds WikiLeaks leaker Bradley Manning not guilty of aiding the enemy but convicts him on other charges. How will the mixed verdict sway NSA whistleblower Edward Snowden's decision on whether to remain on the lam?
White hat hacker Barnaby Jack, who passed away July 25, will be remembered for his demonstrations that dramatically spotlighted the vulnerabilities of ATMs and medical devices.
Proposed breach notification legislation before Australia's parliament hopes to curb the disclosure of information to other countries. Privacy lawyer Françoise Gilbert explains the provision's significance.
How were four Russians and a Ukrainian allegedly able to steal more than 160 million payment card numbers from corporate networks over seven years? An indictment announced by U.S. Attorney Paul J. Fishman provides details.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.