How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
RSA Conference 2013 opens Feb. 25 in San Francisco, and for the fourth straight year Information Security Media Group will be a Platinum Media Sponsor. What's on the agenda of this world-class security event?
A government audit reveals that the Census Bureau does not do a good enough job protecting the confidentiality of its data - a stinging conclusion, considering the bureau collects personal information about every individual residing in the United States.
Risk management is an art, not a science. That is the contention of Andy Ellis, CSO of Akamai and a keynote speaker at RSA Conference 2013. How can psychology change one's approach to risk and security management?
IT security provider Mandiant issues a comprehensive report documenting how a Chinese army unit has for years been hacking into the computers of businesses and governments in mostly English-speaking nations, especially the United States.
Highly publicized breaches at Facebook, Twitter, the New York Times and other organizations in recent weeks suggest there's a new normal in the cyberthreat arena. But the onetime head of U.S. CERT, Mischel Kwon, doesn't think so.
Malware, DDoS and mobile security aside, one of the biggest risks is organizations' lack of visibility into specific threats. Don Gray of Solutionary explains the need for actionable threat intelligence.