To mitigate the top threats for 2013, organizations need to understand the motivations of potential attackers so they can adequately defend their networks and systems. Experts describe risk management strategies for the year ahead.
Forensics expert Rob Lee says its not new types of attacks that concern him. It's the old ones that continue to impact organizations. How can forensics pros learn from past incidents and respond in 2013?
Before embarking on the tragic Newtown, Conn. shootings, Adam Lanza reportedly destroyed his computer. But is the machine's data also destroyed? Forensics expert Rob Lee discusses how "lost" data is retrieved.
The only way to put a dent in financial fraud and cybercrime is through aggressive prosecution and tough sentences for the guilty. That's why a sentencing last week in the RBS WorldPay case is disappointing.
Data breaches are growing, but Verizon's Chris Novak says most incidents could be prevented by more diligent database monitoring. So what specific steps should organizations take to mitigate their risks?
Global Payments Inc., the breached payments processor, now says the scope of its self-discovered data breach may be broader than initially reported and involve personal data collected from merchant customers.
For years, David Matthews, Deputy CISO of the City of Seattle, has been immersed in securing electronically stored information. Now he's written the book on the topic. What are the key themes addressed?
The web-services protocol developed by the National Institute of Standards and Technology allows desktops, laptops, e-tablets and smartphones to access sensors that capture biometric data such as fingerprints, iris and face images.