The answer seems obvious, especially in the context of IT security and information risk. Yet, is it, especially when developing codes and standards, as well as funding research and development initiatives that involve taxpayer money?
Mobile malware and cloud-based botnets will be top cyberthreats for 2013, says Georgia Tech's Paul Royal. How should organizations address these and other upcoming threats in the New Year?
Cloud-based botnets and mobile malware are two of 2013's top cyberthreats. What other threats make the list? Georgia Tech's Paul Royal tells how security pros and organizations can prepare.
The kind of detailed data analysis that helped statistician Nate Silver predict accurately the outcome of the U.S. presidential election could help enterprises using cloud-based SIEM to identify vulnerabilities, says Cloud Security Alliance's Jens Laundrup.
If President Obama's second term were a movie sequel, I'd call it "Unfinished Business." It's time to step up and see through the cybersecurity initiatives Obama spoke about when he first took office.
Mobility continues to change the landscape for security professionals concerned with data loss and the growing number of endpoints, says CTO Dan Hubbard, who offers mitigation strategies.
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
The failure to take appropriate steps to secure their IT assets leaves small and midsize enterprises vulnerable to attacks from cybercriminals seeking to pick low-hanging fruit.
What's missing from remarks by Defense Secretary Leon Panetta, Senate Majority Leader Harry Reid and others is how the stalemate that led to the filibuster of the Cybersecurity Act could be resolved. Will the election make a difference?
Do we have any reason to believe that any targeted banking institution will be better prepared next week to ward off a distributed denial of service attack like those that rocked three banks this week?
With President Obama on the hustings, his national security staff back at the White House is busily addressing cybersecurity matters that should, but aren't, making it to the presidential campaign.
With so much hype and confusion around cybersecurity, falsely claiming an attack can have an impact on organizations trying to safeguard their digital assets.
Budgets are a big issue today for those managing their risk management frameworks, says NIST's Ron Ross, who offers his advice on using cloud as a means to save money and improve IT infrastructure.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
Smaller institutions could use some advice on security for mobile banking and cloud computing. But federal banking regulators apparently don't plan to issue technology-specific guidance.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.