In the wake of high-profile breaches and data leaks, the government will pay a lot more attention to information security. Are security pros ready for this scrutiny? Professor Eugene Spafford has his doubts.
In the wake of the Target breach, the University of Pittsburgh Medical Center has ramped up Internet monitoring to detect early if the organization is a target for attacks, says John Houston, UPMC's security and privacy leader.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
Cybercrime. Privacy. The power of big data and mobility. These issues are as challenging to India as they are to any global region. Vinayak Godse of DSCI discusses his organization's role in improving cybersecurity.
The threats, attacks and crimes don't differ greatly around the world. What does differ is how each region responds. Freddy Dezeure of CERT-EU is working to ensure that Europe is ready to respond appropriately.
Fraudsters continually find new ways to attack, but too many organizations rely on old, unsuccessful methods to detect and prevent fraud. This is the premise, says David Mattos, VP Sales, with Easy Solutions.