Target needs someone who is up for the challenge of evaluating the entire security landscape of the global retail giant, asking tough questions, making changes to mitigate risk - all to help earn back trust.
The fact that the U.S. federal government would, under some circumstances, exploit software vulnerabilities to attack cyber-adversaries didn't perturb a number of IT security providers attending the 2014 Infosecurity Europe conference in London.
Following news of a serious zero-day exploit impacting several versions of Internet Explorer, the Department of Homeland Security is urging the use of other Web browsers until the issue has been remediated.
With the news that several large technology companies are going to assist in funding critical open source projects such as OpenSSL following the Heartbleed exploit, security experts weigh in on the move.
To help address the shortage of qualified cybersecurity professionals, (ISC)Â² is offering colleges and universities a variety of assistance with bolstering cybersecurity education and preparing students for certification.
A hot topic among U.S. federal government security managers and other infosec pros is developing a process to vet mobile applications. The National Institute of Standards and Technology is offering a solution called AppVet.
Following a data breach, sensitive information, including credit card data, is often sold through the underground economy. Security experts discuss why it's so difficult to shut down online criminal forums.
A George Mason University research fellow says the cybersecurity framework, issued earlier this year by the National Institute of Standards and Technology, is likely to cause more problems than it solves.
Verizon's latest annual breach report shows that Web application attacks increased more than malware-fueled point-of-sale intrusions in 2013, says analyst Dave Ostertag, who provides an overview of the report's findings.