Steven VanRoekel says the mobile revolution will fundamentally change the way the federal government serves the public and its employees. But in outlining the Federal Mobile Strategy, the federal CIO hardly mentions security and privacy.
The insider poses one of the greatest and most damaging security risks any organization faces. So why do so many businesses and institutions fail when it comes to addressing this most obvious security risk?
Given the plethora of guidance available, individual operators of the nation's critical infrastructure may be challenged in identifying the guidance that is most effective in improving their security posture, GAO's Gregory Wilshusen says.
A breach is a disaster, says business continuity specialist Ken Schroeder. So organizing an effective breach-response team does not require a reinvention of the wheel. What it does require is a holistic approach.
For individuals looking to hone their skills in business continuity/disaster recovery, it's important to note: Organizations want specialists who can hit the ground running, says Alan Berman of DRI International.
The recent death of North Korean leader Kim Jong II creates political unrest and raises new concerns about money-laundering and sanctioned goods. Here are the red flags for financial institutions to monitor.
Save Mart, the Modesto, Calif.-based grocery chain, now confirms that skimming devices are to blame for the data breach believed to have exposed hundreds of consumer accounts to debit and credit card fraud.