A new poll shows that more than one in 10 U.S. employees says they've known they were violating policies put in place by their company's IT departments, but violated them anyway to get their work done.
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Axelrod is currently executive advisor for the Financial...
It's been almost a year since the Financial Crimes Enforcement Network (FinCEN) issued its red flag advisory about foreclosure scams. Now it looks like the agency sees another spike in mortgage modification scams hitting the U.S.
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...
Should software developers be held liable for their programming errors? A consortium of international cybersecurity experts says yes - and will present its plan for such a program on Tuesday. But at least one dissenting voice calls the effort "counterproductive and silly."
It's a never-ending battle -- the list of naughty and downright evil security threats that challenge financial institutions and security professionals.
From organized crime to SQL injection, here are the experts' choices of eight major security threats to watch in 2010.
Know what scares security expert John Pescatore the most? The image of a remote employee sitting a home office or public setting, plugging into an unsecured network, accessing critical data via a personal laptop or PDA.
Organizations have never had so many security risks in so many remote locations, says Pescatore,...
So, did anyone read about the President's Cybersecurity Action Plan? I'm assuming you've read through all 10 points. You didn't stop to ponder after the first few did you? I mean, you didn't happen to stop after number 8? The one about the incident response plan?
The first federal CTO thinks the new federal CTO also could serve as the federal cybersecurity czar.
Norm Lorentz served as the federal chief technology officer in 2002 and 2003, working within the White House Office of Management and Budget. In that job, Lorentz focused on developing the federal IT enterprise...
Spring time in Washington D.C. used to be marked by the pink and white splashes of color of the cherry trees that line the Potomac and the Tidal basin.
Now I suspect this spring (or possibly even sooner) we're going to see some color of a different kind in D.C. - the color red.