Organizations are not taking the advanced persistent threat seriously enough, says Hord Tipton of (ISC)2. But security professionals also are not mitigating the common threats, he says. Watch the video.
Consumer advocate Deven McGraw describes what she likes and doesn't like about the privacy and security provisions in the proposed rules for Stage 2 of the HITECH Act electronic health record incentive program.
Far too many identity solutions today rely on simple user names and passwords, says Brent Williams, CTO of Anakam Identity Services - the identity product line of Equifax. But the future of identity is bright, he says.
Cybersecurity Act sponsors intensify their campaign to enact the legislation that would change the way the government protects critical federal and private-sector IT networks as a group of key Republican senators offers an alternative bill.
Radiant Logic, SonicWALL and M86 were among the organizations to issue product/solution news releases at RSA Conference 2012. See the latest announcements from the show.
In the PATCO Construction fraud case, attorney David Navetta says the court failed to address two key concerns: reasonable security and good faith. What's next in PATCO's ongoing legal battle?
Voltage Security, TODO1 and IBM were among the organizations to issue product/solution news releases at RSA Conference 2012 this week. See the latest announcements from the show.
"The changes we propose in revision 4 are directly linked to the current state of the threat space - the capabilities, intentions and targeting activities of adversaries - and analysis of attack data over time," says NIST's Ron Ross.
Netgear, Liaison Technologies and Specops were among the organizations to issue product/solution news releases at RSA Conference 2012 on Wednesday, Feb. 29. See the latest announcements from the show.
RSA, PhoneFactor and Rapid7 were among the organizations to issue product/solution news releases at RSA Conference 2012 on Tuesday, Feb. 28. See the latest announcements from the show.
Challenged by sophisticated threats and the complexity and cost of security, global leaders wonder: "Is my organization going to be the next breach headline?" IBM's Latha Maripuri discusses global trends.
Organizations want the efficiencies of cloud computing. But they still worry about availability and security of data in the cloud. CSC's Andy Purdy offers insight into easing cloud security concerns.
"People appreciate being contacted when particular transactions look risky," says Peter Tapling, President and CEO of Authentify. "Out-of-band authentication provides the opportunity to do that in real-time, at very low cost to the institutions."
No one - not even a security vendor - is immune to cyber attacks. "It's not a question of if or when companies will face an attack, but how they're going to defend against it," says Symantec's Francis deSouza.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.