A problem federal agencies face in deploying effective continuous monitoring is that there's just too much guidance, former federal chief information security officer Patrick Howard says.
Congress heard testimony from cybersecurity experts this week about the steps that should be taken to minimize the risk of breaches of the payments system. Learn what Troy Leach of the PCI Council and others had to say.
MasterCard and Visa have announced the formation of a cross-industry group that will work on improving U.S. payment security by advancing migration to chip cards as well as point-to-point encryption.
If Congress fails to enact a national breach notification law, the Obama administration could develop a set of voluntary best practices along the lines of its new cybersecurity framework.
In the wake of its data breach last year, Target Corp. is overhauling its information security and compliance practices, launching a search for a new CIO and creating the position of chief information security officer.
Russia's offensive military actions in Crimea and its threats to the rest of Ukraine are raising concerns about how the conflict could play out in cyberspace.
Social networking site Meetup has been facing ongoing DDoS attacks. It received a notification the attacks would continue unless it paid a fee, which highlights the rising concern of extortion tied to DDoS.
Phyllis Schneck, the Department of Homeland Security's deputy undersecretary for cybersecurity, equates the department's continuous diagnostics and mitigation initiative with a medical probe detecting an infection in the human body.
By automating data analysis, organizations can enhance their threat intelligence and lessen their workloads, says Flint Brenton, president and CEO of AccelOps.
In the wake of high-profile breaches and data leaks, the government will pay a lot more attention to information security. Are security pros ready for this scrutiny? Professor Eugene Spafford has his doubts.
Rick Howard, CSO of Palo Alto Networks, has a new idea for security pros: the cybersecurity canon of books every cyber pro must read at least once in their careers. Which titles make the list?
White House Cybersecurity Coordinator Michael Daniel assesses the cyberthreat environment facing the nation and explains what the federal government is doing about it.
With a decade under its belt, ENISA enters 2014 with a mission to improve cybersecurity across Europe by collaborating with companion agencies around the world, says Executive Director Udo Helmbrecht.
In a keynote address at the RSA 2014 Conference, Kevin Mandia, founder of Mandiant, warns organizations to beware of "victim's fatigue," or letting your guard down after going six months without a breach.
Imagine if an organization received a cybersecurity rating - just like an individual receives an objective credit report. This is the new model promoted by Stephen Boyer and his company, BitSight.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.