CISOs looking for a way to build credibility with senior executives - and win funding for important projects - need to drop the "just say no" approach and build a reputation as a team player, says security professor Ray Davidson.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
Recent penalties against financial institutions for violating money-laundering regulations may not be a deterrent, says anti-money-laundering expert Kevin Sullivan. What's needed? Stronger punishments, he says.
Information sharing within the financial sector has been critical in thwarting cyber-attacks. Legislation pending before Congress would help bridge the information gap among industries, says Paul Smocer of BITS.
Britain has an IT skills gap problem, not unlike its American cousin's, as well as nearly every other nationality. Besides technical experts, society needs psychologists, law enforcers, strategists, risk managers, lawyers and accountants with cyber know-how.
Security threats to healthcare organizations are on the rise - and so are regulatory requirements. Kim Singletary of McAfee discusses the top breach prevention and response challenges for healthcare organizations in 2013.
Cybersecurity legislation that cleared the House of Representatives last year, and that President Obama opposed, will be reintroduced Feb. 13 by the Republican chair and Democratic ranking member of the House Select Committee on Intelligence.
The compromise of hundreds of payment cards, apparently tied to fraud worldwide, has been linked to a network hack affecting an Arizona supermarket chain. And the attack involved a new kind of malware, the chain says.