Big data is a hot item on every banking institution's security agenda, says Gartner analyst Avivah Litan. Here she explains why mid-sized institutions are in the best position to implement new technology.
As a result of high-profile breaches, such as the Target incident, security is increasingly a board issue. What are the key topics security leaders should prepare to discuss in 2014? Alan Brill of Kroll offers his forecast.
Three Democratic senators are calling for a hearing to examine whether stronger cybersecurity standards are needed to protect consumer data following a massive breach at Target that affected as many as 40 million debit and credit cards.
American and Russian negotiators met last month to discuss cybersecurity issues, including the use of the Nuclear Risk Reduction Centers to improve communications between the two nations to mitigate malicious cyber-activity.
A federal district judge in New York upheld the constitutionality of the National Security Agency's program to collect metadata of phone calls made by Americans. The ruling conflicts with another federal judge's recent decision.
One key way to reduce the risk of a breach is continuous improvement of information security programs. It's dangerous to put security controls in place and then walk away, thinking you're finished, warns security expert Kate Borten.
The potential of governments messing with commercial IT security products - think China and the NSA - means organizations need to improve lines of communications to assure the integrity of the IT wares they acquire. ISF's Steve Durbin discusses mitigating supply-chain risk.
President Obama defends the National Security Agency's bulk-collection initiative, but suggests he may adopt some of the recommendations presented by a panel that proposes changes in the NSA's surveillance program.