CISOs in all sectors are taking steps to mitigate the risks posed by the OpenSSL vulnerability known as the Heartbleed bug. Learn how they're sizing up the situation and taking action.
Malcolm Harkins has a unique role. He oversees both security and privacy for global technology vendor Intel. What tips does he offer individuals who seek to build careers in either discipline - or both?
The Obama administration has issued a policy statement that says businesses sharing cyberthreat information with one another are not violating antitrust laws.
Technology companies Cisco and Juniper Networks have issued alerts about which of their products are vulnerable to the Heartbleed bug. Learn about the latest developments.
Neustar is about to release a new report on the DDoS threat landscape. What are some of the key trends to watch? Neustar's Jim Fink offers a preview of the study's findings.
As news of the Heartbleed bug continues to spread, government agencies in the U.S. and Canada are issuing statements on the vulnerability. Find out the latest on this threat and what thought-leaders are saying.
Analysts say it's easy to believe the Neiman Marcus data breach may be tied to attacks on Heartland Payments Systems Inc. and other entities. But tracking the crimes is one thing; prosecuting is quite another.
The chief executive of the Finnish company that uncovered the Internet website vulnerability known as Heartbleed says security practitioners should rethink how they approach IT security by placing a greater emphasis on vetting software for vulnerabilities.
Security experts agree that the newly-discovered Heartbleed bug is a serious threat, but what are the specific risks, and how can they be mitigated? Thought-leaders offer insights and practical advice.
Security forums and experts are buzzing about the newly discovered Heartbleed bug, which allows anyone on the Internet to read the memory of systems protected by vulnerable versions of OpenSSL software.
Symantec's 2014 Internet Security Threat Report calls 2013 the year of the mega breach. Why? Because it's getting far too easy for the bad guys to pull off these breaches, says Symantec's Kevin Haley.
The workforce of a key information security occupation - computer and network systems administrator - has been experiencing a decline in numbers in recent years, according to an Information Security Media Group analysis of U.S. Labor Department data.
Eight defendants have been charged in an alleged identity theft fraud scheme involving the theft of personal information from a call center for use in unauthorized wire transfers and to obtain payment cards.
Ellen Richey, Visa's chief enterprise risk officer, will offer a keynote address on payments security and fraud prevention at Information Security Media Group's Fraud Summit San Francisco on April 29.
In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.com, you agree to our use of cookies.