Editor's Note: Excerpts of this interview appear in ISMG's Security Agenda magazine, distributed at RSA Conference 2014.
Privacy should be built into the design of all healthcare information technology and related processes, says Michelle Dennedy, who's writing a book on the concept of "privacy by design."
Today's threat landscape is rapidly expanding to include cyber-attacks attributed to nation states. How must organizations respond? Mike McConnell, former U.S. National Intelligence Director, shares insight.
Some people say the U.S. faces a cybersecurity staffing shortage. Renowned computer science professor Eugene Spafford disagrees. He discusses what he sees as the real shortage and what we can do about it.
Here's a sampling of the many sessions at RSA 2014 that will provide timely insights for security specialists in the government sector on such topics as vetting foreign technologies and implementing the new cybersecurity framework.
Bipartisanship - a rare commodity on Capitol Hill - manifested itself with the House Homeland Security Committee's approval of a bill aimed to help buttress the cybersecurity of the nation's critical infrastructure.
Leading this week's roundup, HP published its annual Cyber Risk Report for 2013, identifying top vulnerabilities and providing analysis of the threatscape. See additional news from Microsoft, Symantec and more.
Encryption gaps in retail payment card transactions were highlighted at a Congressional hearing that examined security failures in the aftermath of malware attacks against point-of-sale systems at Target and Neiman Marcus.
When breaches result from retailers' lax security practices, merchants should be obligated to help banking institutions cover fraud losses and other post-breach expenses, says Viveca Ware of the Independent Community Bankers of America.