IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.
Mobile security threats can be managed through testing and strategic risk-mitigation strategies, says Keith Gordon, who oversees authentication and security strategies for Bank of America's consumer online and mobile banking units.
Why did hackers target the federal Thrift Savings Plan? Details from the FBI and the TSP have been sketchy, and Sen. Susan Collins is demanding more information - including the reasons behind the delayed notification.
President Obama ordered increasingly sophisticated cyberattacks to cripple Iranian nuclear enrichment centrifuges as part of a major expansion of America's first persistent use of cyberweapons, according to a new report.
Priority one for Nicole Muryn, BITS' new director of regulatory and legislative affairs, is to make sure regulators consider financial institutions' concerns as they craft rules to carry out Dodd-Frank.
Flame is designed to carry out cyber espionage and steal valuable information, including but not limited to computer display contents, information about targeted systems, stored files, contact data and audio conversations.
Israel is being blamed - or, perhaps, taking credit - for the creation of Flame, the sophisticated cyberspyware that has targeted organizations in the Middle East, especially its mortal enemy, the government of Iran.
The National Institute of Standards and Technology's guidance recommends how and when cloud computing is appropriate, addresses risk management issues and indicates the limits of current knowledge and areas for future research and analysis.
One measure of an incident's impact is dollars lost of fraud. But the "soft" costs - loss of reputation and productivity - are the ones that most get the attention of Terry Austin of Guardian Analytics.
The Obama Administration has unveiled a "digital government" strategy that requires federal agencies to launch new mobile applications. The strategy calls for standardized implementation of privacy controls.