Training that's designed to help workers avoid clicking on links from spear-phishing e-mails may be ineffective because employees often fail to read training materials, says Eric Johnson, a Vanderbilt University professor who's co-author of a new study on the subject.
Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.
American and Russian negotiators met last month to discuss cybersecurity issues, including the use of the Nuclear Risk Reduction Centers to improve communications between the two nations to mitigate malicious cyber-activity.
A federal district judge in New York upheld the constitutionality of the National Security Agency's program to collect metadata of phone calls made by Americans. The ruling conflicts with another federal judge's recent decision.
The potential of governments messing with commercial IT security products - think China and the NSA - means organizations need to improve lines of communications to assure the integrity of the IT wares they acquire. ISF's Steve Durbin discusses mitigating supply-chain risk.
While preparing a speech to be delivered in Korea, NIST's Ron Ross wanted to convey the message of the importance of computer security. He hit on five themes - threat, assets, complexity, integration and trustworthiness - which form the acronym TACIT.
Whether reports that the National Security Agency entered into a secret contract with security provider RSA are true or not - and RSA says they're not - the reputations of all American security vendors have been tarnished.
Federal agencies overwhelming ignore guidance on the top 20 critical security controls, a new survey shows. Two risk management experts explain the pros and cons of adopting this guidance vs. broader NIST guidance.