Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka5 discusses how to mitigate third-party risks.
In a preliminary step toward enactment of a new EU data protection law, the European Parliament on March 12 approved a draft proposal for a comprehensive overhaul of the EU's 1995 data protection directive.
Having cyber-responders from various civilian agencies located on the same campus should help foster new ideas to battle threats to critical government and private-sector IT systems, a top administration official says.
At his March 11 Senate confirmation hearing, Navy Vice Adm. Michael Rogers, chosen by President Obama to be the next director of the National Security Agency, declines to characterize NSA leaker Edward Snowden as a traitor.
Disclosing that it fulfilled only 11 percent of the requests for customer information from U.S. law enforcement agencies during the second half of 2013, Microsoft reiterates its call for an international framework that protects customers' rights.
A retailer should help pay for card re-issuance and other expenses after a breach if the merchant is shown to have had inadequate security in place, says Viveca Ware of the Independent Community Bankers of America.
Healthcare organizations can now take advantage of a growing number of resources offering guidance on improving medical device security. Learn about the latest security assessment framework that's now being tested.
Congress heard testimony from cybersecurity experts this week about the steps that should be taken to minimize the risk of breaches of the payments system. Learn what Troy Leach of the PCI Council and others had to say.