Comptroller of the Currency Thomas Curry's comments in a Sept. 18 speech could be an early indication that regulators will put more pressure on banks and service providers to fill cybersecurity gaps, some observers say.
John Streufert, the DHS director overseeing the rollout of a federal continuous diagnostic initiative to mitigate IT systems vulnerabilities, expects that many state and local governments will participate in the program.
NIST is developing risk management guidance on the IT supply chain that says organizations should take an incremental approach and ensure that they first reach a base maturity level in organizational practices.
Even when NASA does something right, such as adhering to best practices in awarding a cloud computing contract, the space agency gets criticized by its inspector general for failing to leverage that contract throughout the organization.
What top mobile security concerns should organizations be considering? As more devices connect to the enterprise, Akamai's Fran Trentley says there are certain priorities businesses must prepare to address.
National Security Agency Director Keith Alexander declined to say that the agency would stop using contractors in top secret IT positions to prevent a leak such as the one that exposed NSA programs to collect metadata on American citizens.
Financial fraud expert Joe Rogalski explains why card issuers are ultimately responsible for losses linked to ATM cash-out schemes, like the $45 million worldwide cyberheist that made headlines last month.
A House panel establishes a bipartisan supply chain working group to explore the federal government's role in helping industry assure that IT and telecommunications wares they buy abroad are safe from exploits.
A key difference between state-sponsored espionage and organized criminals or hacktivists is the level of persistence and determination to break through defenses. Here's advice from security experts on defending against nation-state attacks.