An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.
Although European Union leaders expressed concerns about the NSA's surveillance programs to President Obama, that didn't prevent the United States and EU from issuing a communique highlighting cooperation on cybersecurity.
A class action lawsuit filed by two banks against Target in the wake of its 2013 breach has an unusual twist: It seeks damages from Target and Trustwave, allegedly the retailer's qualified security assessor. Experts offer an analysis.
Bowing to strong public concerns about privacy, President Obama and a bipartisan group of House members separately introduced plans to eliminate the National Security Agency's bulk collection of citizens' phone records.
When a former U.S. president acknowledges that he won't use e-mail to correspond with foreign leaders to avoid snooping by the NSA, you know the image of America as a bastion of freedom - at least online - has dropped a few more notches.
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.
Banking institutions should be evaluating zero-day vulnerability risks posed by Microsoft's dropping of support next month for Windows XP. But experts say their biggest concern should be how those vulnerabilities will affect customers and vendors.
Speculation surrounding the cause of the disappearance of Malaysia Airlines Flight 370 hasn't included the possibility of a cyber-attack. But one cybersecurity expert contends hacking an airliner is feasible.
Umpqua Bank is the latest U.S. banking institution to file a class action lawsuit against Target Corp. But what makes this suit stand out from the crowd of litigants? Two attorneys offer their insights.
Two Stanford University researchers are conducting a study using crowdsourcing to show that the NSA's culling of telephone metadata can reveal a lot about an individual. I joined the crowd to find out what the metadata says about me.
Phyllis Schneck, the Department of Homeland Security's deputy undersecretary for cybersecurity, equates the department's continuous diagnostics and mitigation initiative with a medical probe detecting an infection in the human body.
In the second full day of RSA 2014, ISMG's editors record exclusive video interviews with Troy Leach of the PCI Council, Adam Sedgewick of NIST and Gartner's Avivah Litan. What insights do these thought-leaders share?