"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.
The FCC's new "net neutrality rule," which prevents ISPs from slowing down content streaming along their networks and from charging extra fees to assure faster speed, includes provisions designed to protect the confidential information of customers.
Congressional investigators for the first time are designating protecting the privacy of personally identifiable information as a high risk area within the federal government and calling on Congress to enact new legislation to enhance PII safeguards.
The Obama administration has taken new, but modest steps to limit the ability of intelligence agencies to collect data on individuals, but the new policy doesn't end the bulk collection program revealed by former NSA contractor Edward Snowden.
President Obama says his proposed cybersecurity budget is designed to help prevent foreign nations or hackers from shutting down American networks, stealing trade secrets or invading the privacy of American families.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
Is Amazon India on the verge of extending its online payments gateway to offline sellers and kiranas? And if so, what are the potential business implications and security risks for Indian organizations?
"The FTC has awoken to the reality that there can be no privacy without cybersecurity," says Trend Micro's Tom Kellermann, in the wake of an FTC complaint against a data broker that sold payday loan applications to third parties.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Who hacked Sony? Not us, say the North Koreans, ending days of silence. As Deloitte becomes the latest victim of the G.O.P. gang that's claimed credit, one thing is certain: Sony won't have to buy the movie rights to this hacking story.