During her first month on the job, former Secretary of State Hillary Clinton used a private email server that lacked a digital certificate that would have ensured encrypted and authenticated email communications, surmises security firm Venafi.
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
The Senate Intelligence Committee could consider in the coming days new cyberthreat information sharing legislation that's seen as more to the liking of the business community than the measure proposed by President Obama.
As part of its biggest reorganization in its nearly seven-decade history, the Central Intelligence Agency is creating a Directorate of Digital Innovation that will use cyber technology to amass and analyze intelligence.
Word that Hillary Clinton maintained a personal email server while secretary of state has elevated cybersecurity and privacy as political issues. But it's just the latest example of such issues grabbing the attention of U.S. voters.
Small and mid-size businesses might not be able to afford participating in voluntary programs to share and receive cyberthreat information, as President Obama has proposed, industry representatives tell Congress.
This year could mark a turning point for the sharing of threat intelligence, but only if the government is able to build a framework that instills private-sector trust, says threat researcher Lance James.
A willingness to compromise expressed at a House hearing on President Obama's cyberthreat information sharing initiative offered a sign of hope that legislation to get businesses to share such data could pass Congress and be signed into law.
ITSERT's Rajan Raj Pant discusses the formation of ITSERT-NP to address Nepal's security challenges. How will the public-private partnership model be leveraged to create a central platform for cybersecurity?
Cybercrime is on the rise. To combat it, GTU is launching e-Raksha Research Centre - a public private partnership initiative. The spin-off is also aimed at growing the capacity of InfoSec professionals.
Lawmakers have begun the process of taking up President Obama's call to enact cyberthreat information sharing legislation. But can Congress reach a consensus on appropriate liability protection, the issue that derailed earlier legislative proposals?
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
The Anunak/Carbanak gang continues to rob financial services firms and retailers, in part with ATM malware. A new report says the cybercrime gang has stolen up to $1 billion from banks in Russia, the U.S. and beyond.