Automating the process of excising personally identifiable information when sharing data is a challenge that the Defense Advanced Research Projects Agency hopes to overcome. DARPA will spend up to $60 million to fund projects to address the problem.
The IT security industry must do a much better job of persuading young people with the requisite math and science skills to join the cybersecurity workforce rather than choose another profession, says David Shearer of (ISC)Â².
Security expert Mike Canavan of Kaspersky Lab North America pinpoints several critical security steps that organizations can take to help reduce the likelihood they'll become a victim of a hacking attack.
As organizations increasingly focus on securing critical data, they mustn't overlook one huge vulnerability: enterprise email. Steven Malone of Mimecast discusses the latest in unified email management.
(ISC)Â² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
The House on April 23 passed a second cyberthreat information sharing bill, the National Cybersecurity Protection Advancement Act. Now it will be combined with the previously approved Protecting Cyber Networks Act before it's sent to the Senate.
How badly does the president want Congress to enact cyberthreat information-sharing legislation? Despite concerns over provisions of two bills, the White House isn't threatening vetoes as it did in previous congresses when raising similar objections.
Mark Clancy, CEO of Soltra, which provides an automated information sharing platform, says banks and credit unions that don't share threat intelligence will never advance their information risk management practices.
Attitudes about cyberthreat information sharing, as well as attack attribution, have dramatically changed in the last 18 months, says the FS-ISAC's Bill Nelson, a featured speaker at RSA Conference 2015.
With India facing a major staffing deficit in cybersecurity, the National Security Database is redoubling its efforts to organize a credible workforce. Director Rajshekhar Murthy shares these initiatives.
Leaders and top practitioners from numerous federal government agencies will transplant themselves to San Francisco this coming week to share their knowledge on a wide range of topics at RSA Conference 2015.
In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
After beating back amendments by Democratic members to limit liability protections for businesses, the House Homeland Security Committee on
April 14 unanimously approved cyberthreat information sharing legislation on a voice vote.