Legislation has been introduced in the House and Senate that would require a "kill switch" on smart phones, allowing consumers to remotely wipe personal data from their mobile devices if they're lost or stolen.
Identity is the new perimeter, and that concept stretches organizations into lots of new directions when managing access and privileges - especially in the mobile age, says John Hawley of CA Technologies.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
Cybercrime. Privacy. The power of big data and mobility. These issues are as challenging to India as they are to any global region. Vinayak Godse of DSCI discusses his organization's role in improving cybersecurity.
An alleged hacker based in the United Kingdom has been charged with infiltrating servers belonging to the U.S. Federal Reserve Bank. The announcement comes just months after the Brit was charged in connection with other U.S. government hacking incidents.
During RSA 2014, Information Security Media Group held an exclusive luncheon for its editorial advisers, a group of industry thought-leaders who help shape the discussion around information security, privacy and risk management. View images taken from the event.
The threats, attacks and crimes don't differ greatly around the world. What does differ is how each region responds. Freddy Dezeure of CERT-EU is working to ensure that Europe is ready to respond appropriately.