From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
The Federal Trade Commission announced on Monday that is has notified nearly 100 organizations that their peer-to-peer (P2P) file-sharing networks have been sharing information with the wrong people.
Joy Pritts, J.D., has been named the first chief privacy officer within the Office of the National Coordinator for Health Information Technology. ONC is a unit within the U.S. Department of Health and Human Services that is carrying out the provisions of the HITECH Act, including beefed up information security...
From blogs to wikis, Facebook to Twitter, social media have taken over the workplace.
But how do security leaders manage social media before all these new tools and technologies become unmanageable?
Jerry Mechling is a prominent author and lecturer at the Harvard Kennedy School, and in an exclusive interview he...
Malicious criminal attacks have doubled, and the average cost of a data breach has increased to $204 per compromised record.
These are the headlines from the 5th annual "Cost of a Data Breach" study by the Ponemon Institute.
"In an interconnected world, an attack on one nation's networks can be an attack on all," Secretary of State Hillary Clinton said in a major foreign policy address on Internet freedom.
Interview with Lydia Parnes, Former Director of the FTC's Bureau of Consumer Protection
Privacy, data security and consumer protection - three of the top concerns to organizations everywhere. And they are three of the topics nearest and dearest to Lydia Parnes, former director of the Federal Trade Commission's...
Interview with Jay Foley of the Identity Theft Resource Center
Financial scams and incidents of medical identity theft are on the rise - and they're among the main threats to business and consumers in 2010. This is the warning from Jay Foley, executive director of the Identity Theft Resource Center.
Citizens have a heightened expectation of privacy when they interact with the government online, says Heather West, a CDT policy analyst with the advocacy group Center for Democracy and Technology.
Marcus Ranum has a unique take on the biggest information security threats to organizations and individuals.
A renowned expert in secure systems and design, Ranum, currently the CSO of Tenable Network Security, offers a new look at topics such as the risks of cloud computing and what he calls the myth of cyber...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.