As news of the Heartbleed bug continues to spread, government agencies in the U.S. and Canada are issuing statements on the vulnerability. Find out the latest on this threat and what thought-leaders are saying.
Security experts agree that the newly-discovered Heartbleed bug is a serious threat, but what are the specific risks, and how can they be mitigated? Thought-leaders offer insights and practical advice.
Security forums and experts are buzzing about the newly discovered Heartbleed bug, which allows anyone on the Internet to read the memory of systems protected by vulnerable versions of OpenSSL software.
In many if not most enterprises, the chief information security officer reports to the chief information officer. After all, enterprises cannot function without IT, and security is a support function to safeguard data and systems. Or is it?
Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Even so-called minor breaches can cost organizations nearly $200,000, according to one finding from NTT Group's annual Intelligence Report. Rob Kraus of Solutionary shares the study's insights and advice.
An analysis of the Target breach prepared for a Senate committee is a political document that might help its patron's agenda but doesn't go far enough to identify technical solutions to help enterprises avoid Target-like breaches.
A report prepared for a Senate committee provides an extensive analysis of how retailer Target Corp. possibly missed several opportunities to prevent the massive data breach that compromised the credit card details of millions of customers.
When a former U.S. president acknowledges that he won't use e-mail to correspond with foreign leaders to avoid snooping by the NSA, you know the image of America as a bastion of freedom - at least online - has dropped a few more notches.
Retail point-of-sale breaches at Target Corp. and Neiman Marcus have put a spotlight on payment card security and encryption. But achieving true end-to-end encryption isn't easy, says data protection specialist Richard Moulds.
The investigation of the disappearance of Malaysian Flight 370 is raising issues that are very similar to those considered in cybersecurity cases, ranging from the insider threat to deleting data from a computer.