The panel would review the latest intelligence and communications technologies to determine the risk of unauthorized disclosure to national security and foreign policy, as well as assess the need to maintain the public trust.
NSA Deputy Director John Inglis tells a Senate panel that the agency neither fired nor admonished any personnel in connection with the leak by Edward Snowden of details about top-secret intelligence-gathering programs.
Get up to speed on the dos and don'ts of breach response. Plus, have a little fun along the way, as Mike Bruemmer, Vice President of ExperianÂ® Data Breach Resolution, and Tom Field, Vice President of Editorial for Information Security Media Group, act out a mock conversation between a data breach client and privacy...
Facebook acknowledges it exposed 6 million members' phone numbers and e-mail addresses to unauthorized viewers, the latest example of IT security incidents creating mistrust of corporations and governments.
Security and privacy professionals should be cautious about the type of information they share with the federal government's intelligence community, says Peter Swire, a former White House privacy counselor.
The implementation of IPv6, the new Internet communications protocol, will have a major impact on identity and access management. EMC researcher Davi Ottenheimer explains how organizations should prepare.
Collecting massive amounts of data on individuals, whether in the government or private sector, has become the norm in our society. It's not quite Orwellian, but it's a situation we might have to learn to live with.
A Department of Homeland Security system used to conduct background checks has been exposing personally identifiable information of employees and contractors since July 2009. DHS says the vulnerability has been fixed.
If everyone supports the idea of sharing cyberthreat information, then why is information sharing so difficult? Shawn Henry, a former investigator with the FBI, tells how organizations can clear their biggest hurdles.
Intel Chief Information Security and Privacy Officer Malcolm Harkins sees having one leader who handles IT security and privacy responsibilities as essential. "At the end of the day," he says, "there's a level of common objectives."
NIST's Ron Ross, a big NASCAR fan, likens new security controls guidance to the tools race-car builders use to prevent drivers from breaking their necks when crashing into a brick wall at 200 miles an hour.