With a second House panel approving the USA Freedom Act, Congress moves a step closer to sending the president a bill to limit the government's bulk metadata collection program, the Center for Democracy and Technology's Harley Geiger says.
HDFC Bank launched a new cybercrime training program for police. The goal: help officers improve response to fraud and other crimes. What are the program's key elements, and how will success be measured?
A leader of ISACA, Sarb Sembhi, defends President Obama's cybersecurity framework, which critics contend lacks sophistication. He says detractors miss the point about how frameworks evolve.
Verizon's latest annual breach report shows that Web application attacks increased more than malware-fueled point-of-sale intrusions in 2013, says Ashish Thapar, who provides an overview of the report's findings.
Too many organizations have a device-centric BYOD policy that fails to look at big picture issues, including building a comprehensive strategy for protecting corporate information no matter how it's accessed, says Ian Evans of AirWatch.
As members of the workforce increasingly rely on mobile devices to access corporate data, secure sharing of files becomes more challenging, says Accellion's Vidhya Ranganathan, who describes an effective strategy.
On the day Target's CEO resigned in the aftermath of a massive data breach, the Ponemon Institute issued its 2014 Cost of Data Breach Study, which Chairman Larry Ponemon says helps explain why CEOs should be more involved in breach preparedness and response....
A behavioral analysis approach to fighting malware can be more effective than a signature-based approach in the current threat environment, contends Webroot's Patrick Kennedy.
Voltage Security's Mark Bower contends data-centric security can help break down barriers to the widespread use of encryption and help protect sensitive information, including credit card numbers.
Network "situational awareness" can help organizations in all business sectors improve regulatory compliance by identifying networks and devices that need protection, says Lumeta's Reggie Best.
Hurt the criminals and cyberthreats will decrease. That's how organizations in all sectors, working with law enforcement, should approach cybersecurity, says Juniper Networks' Kevin Kennedy.
Individuals resort to lying about themselves to protect their identities when accessing systems in today's imperfect cyber world, says Peter Tapling, president of Authentify, an out-of-band authentication service.
Trusted Identity is the end-goal, and mobile devices are the means to get there, says Dave Rockvam of Entrust. How are mobile devices being leveraged for security in the enterprise today?
For too long, code writers have been measured on the features built into their applications - not the potential security vulnerabilities. It's time to change that perspective, says Maty Siman of Checkmarx.
When it comes to DDoS attacks, the hacktivists get all the headlines, but there is a robust service industry behind the scenes, supporting these sophisticated strikes, says Darren Anstee of Arbor Networks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.