The RSA Conference 2014 will be held Feb. 24-28 in San Francisco, and Information Security Media Group will be the only Diamond Media Sponsor. Learn what's on the agenda at this world-class security event.
NIST has unveiled its long-awaited cybersecurity framework, which provides best practices for voluntary use in all critical infrastructure sectors, including, for example, government, healthcare, financial services and transportation.
Employing quantum physics, Yi-Kai Liu, a computer scientist at the National Institute of Standards and Technology, is attempting to devise a way to create a one-shot memory device that could help secure transactions or administrative passwords.
Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Today's threat landscape is rapidly expanding to include cyber-attacks attributed to nation states. How must organizations respond? Mike McConnell, former U.S. National Intelligence Director, shares insight.
Some people say the U.S. faces a cybersecurity staffing shortage. Renowned computer science professor Eugene Spafford disagrees. He discusses what he sees as the real shortage and what we can do about it.
Security experts disagree about whether the breach of a refrigeration vendor is ultimately to blame for the network attack that compromised Target. Here, they explain their views.
Where do organizations fail when defining privacy, and how can they best leverage technology to ensure privacy protection? Michelle Dennedy of McAfee and Trevor Hughes of the IAPP share perspectives.
Major cyberthreat concerns for banking institutions in 2014 include DDoS attacks, mobile malware, ransomware and insider threats, among others. Experts offer insights on mitigation strategies.
Here's what to expect in the cybersecurity framework, a catalog of tools to be released Feb. 13 that's designed to help critical infrastructure owners develop information security protection programs.
Most organizations today have breach response plans. But far too few test these plans before an incident occurs. Experts Michael Bruemmer and Ronald Raether discuss the essentials of breach response.
In the past few months, the "Internet of Things" has gained more attention, and the cybersecurity and privacy implications are only beginning to be addressed in many quarters.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
Leading this week's roundup, HP published its annual Cyber Risk Report for 2013, identifying top vulnerabilities and providing analysis of the threatscape. See additional news from Microsoft, Symantec and more.
Encryption gaps in retail payment card transactions were highlighted at a Congressional hearing that examined security failures in the aftermath of malware attacks against point-of-sale systems at Target and Neiman Marcus.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.