"With significant progress having been made, with growing recognition of DHS's roles and authorities, and the cybersecurity legislative proposal now delivered to the Hill, it's a logical point for me to leave," Philip Reitinger says.
"Updating this law to reflect the realities of our time is essential to ensuring that our federal privacy laws keep pace with new technologies and the new threats to our security." says bill sponsor Sen. Patrick Leahy.
"Unfortunately, like many organizations, we were targeted by criminal hackers who penetrated our system with a new strain of a virus," Massachusetts Labor and Workforce Development Secretary Joanne Goldstein says.
It's been nearly two years now since the corporate account takeover spree began. So, what exactly are the courts, institutions and the financial services industry doing today to prevent further incidents of fraud?
The threat landscape has evolved dramatically over the past several years, and now it's time for healthcare security leaders to step up and meet the new challenges involved with securing critical data.
The Obama administration's plan for a federal data breach notification policy is too vague to be effective, and it lacks teeth to penalize violators, according to experts who raise open questions about the proposal.
The security of medical devices is becoming a significant risk management concern. That's because the devices increasingly are linked to networks and exposed to malware, which could impair their functionality and potentially adversely affect patient safety.
A star-studded lineup of top administration officials including four cabinet secretaries and three other senior executives announced the new international strategy, emphasizing the importance of cybersecurity to American foreign policy.
More than just Facebook friends, today's Chief Information Security Officer needs to connect and collaborate with key corporate allies who can influence the enterprise risk and security practices within any organization.