People with good analytical backgrounds that understand regulatory compliance are in demand. Their counterparts - defenders of IT systems - will always be in demand.
"We need the tens of thousands that can manage those defenders and then we need 100,000 that are out there learning the trade, that are passionate...
Google will pay $22.5 million to settle FTC charges that it misrepresented its privacy promises to Apple Safari users. The fine is the largest penalty the FTC has ever obtained for violation of one of its orders.
CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
Understanding threats and identifying modern attacks in their early stages is key to preventing subsequent compromises, and proactively sharing information among organizations is an increasingly effective way to identify them.
The United Kingdom and the United States are both cracking down on healthcare organizations that have experienced information breaches. But they're taking very different approaches. Which approach will prove most effective?
The United States - and other advanced societies - shouldn't let the reliability of their electric grids lull them into being unprepared for possible massive power outages caused by cyberattacks, cybersecurity expert Harry Raduege says.
Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.
Senate supporters of the Cybersecurity Act of 2012 failed to gain the 60 votes necessary to bring the measure up for a vote, a significant setback for those seeking enactment of a comprehensive cybersecurity law this year. The vote was 52 to 46.
Two men have been sentenced for defrauding accountholders whose debit cards were compromised in the Michaels point-of-sale breach that hit stores in 20 states. What was their role in an elaborate fraud scheme affecting nearly 100,000 accounts?
After a breach, some organizations meet the minimum requirements for notification and then hope for the best. The Utah Department of Health is taking a very different approach that's worthy of imitation.