In February 2015, Financials was the lone industry sector with cybercrime incidents above six-month averages. This is largely attributed to the massive breach at health insurer Anthem. More >
No one should assume that the Wi-Fi they are using is secure, including (perhaps especially) in hotels. More >
News this week included the state of mobile apps, Comcast's acquisition, the LightSquared saga, biometric security and broadband speeds. More >
When we see the increase in breaches and vulnerabilities and the growing concern of Internet espionage, I don’t see how anyone in a leadership role can ignore cybersecurity. More >
We may never see a completed national data protection and breach notification law, if questions about language, coverage and interference with state protections aren't adequately answered. More >
The primary issue that NopSec CEO Lisa Xu says the company is trying to address is that most IT organizations are overwhelmed by the number of vulnerabilities that need to be continually remediated. More >
New privacy threats and concerns have created the opportunity for IT professionals to fill a crucial role within the organization. A new cert addresses the need.More >
Don't ignore these potentially serious vulnerabilities.More >
Cloud means that an enterprise must trust a service provider to provide controls at a physical and infrastructure layer, but logical controls can remain the same.More >
Consumers will start to require more utility from tech, and the enterprises behind the scenes will be forced to rise to those expectations.
Four big players are taking four very different paths to success.
With to-do lists that grow longer every hour, it's essential that we work smarter and more efficiently to keep up with the demands of everyday life.
Smartwatches will change e-commerce as we know it, whether it's through altering the face of consumer data, miniaturizing the act of consumer engagement, or changing the way we pay for things.More >
This publication provides guidance on protecting the confidentiality, integrity, and availability of information processed...
This guide will assist organizations and system owners in making practical sanitization decisions based on the categorizat...
This publication provides a set of procedures for conducting assessments of security controls and privacy controls employe...
This three-volume report presents an analytical framework that organizations can use to develop effective cybersecurity st...