"We find it hard to believe that there are any reasons or basis to oppose this legislation," presidential counterterrorism adviser John Brennan says of the Cybersecurity Act of 2012. "I'm just very puzzled as to why individuals would oppose this."
Amidst the hepatitis C outbreak at Exeter Hospital in New Hampshire, we need to ask: How could this happen? How could a medical technician even be hired after being fired at least twice by other hospitals?
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
Data breaches are growing, but Verizon's Chris Novak says most incidents could be prevented by more diligent database monitoring. So what specific steps should organizations take to mitigate their risks?
When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.
Information security isn't just the domain of those branded information security professionals but also requires the knowledge of nearly every other IT occupation as well as individuals in many non-technology jobs, too.