In the wake of the breaches suffered by JPMorgan Chase, Sony and Anthem, attack attribution and information sharing are playing more prominent roles for banking leaders, and they will be key discussion points at the upcoming RSA Conference 2015 in San Francisco.
Web.com won't confirm or deny that its Register.com subsidiary, which manages more than 2 million domain names, has been breached. But a news report claims the FBI is investigating a year-old intrusion.
As the next wave of medical school graduates begins clinical training at healthcare organization across the U.S., it's critical these new clinicians be prepared to protect patient privacy, says healthcare attorney and professor Julie Agris.
ITSERT's Rajan Raj Pant discusses the formation of ITSERT-NP to address Nepal's security challenges. How will the public-private partnership model be leveraged to create a central platform for cybersecurity?
Cybercrime is on the rise. To combat it, GTU is launching e-Raksha Research Centre - a public private partnership initiative. The spin-off is also aimed at growing the capacity of InfoSec professionals.
As cybercrime grows, Section 66A of India's IT Act is under scrutiny of the court, government and security leaders. Some experts say it requires amendments to ensure correct interpretation and implementation.
While there's anecdotal evidence that the NIST cybersecurity framework is proving helpful to businesses in their risk management efforts, there's not yet any measureable proof of its success at preventing damaging cyber-attacks.
Starting in April, Singapore plans to have a dedicated and centralized cybersecurity agency. But experts question whether the agency can take a holistic approach and effectively coordinate with industry.
The loss of thousands of paper records for those with coverage from health insurer Independence Blue Cross sends a strong reminder that all employees within organizations need to be trained on data security best practices.
Amidst a global information security staffing crisis, India must focus on developing more practitioners with deep technical skills. This is the practical advice from Hord Tipton, out-going director of (ISC)Â².
The latest entrant into the password "hall of shame" is Sony Pictures Entertainment. As the ongoing dumps of Sony data by Guardians of Peace highlight, Sony apparently stored unencrypted passwords with inadequate access controls.
Sen. Ron Johnson, R-Wis., the presumptive chairman of the Senate committee with government IT security oversight, hasn't immersed himself heavily in cybersecurity issues during his 4-year Senate tenure.