Parliament's Intelligence and Security Committee has called for a reboot of the regulations that govern Britain's intelligence services, warning that the current approach "is unnecessarily complicated and - crucially - lacks transparency."
"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
Manufacturers of PCs and mobile devices must end the practice of preloading "bloatware." Lenovo's experience with offering "free" adware shows the hidden security and performance tradeoffs buyers must endure.
Is your organization running its anti-malware defenses properly? Don't be so sure. A new study finds that essential features built into anti-virus software are not always being used. From an information security standpoint, that's a serious problem.
A key component of President Obama's executive order to encourage industry to share cyberthreat data is the creation of information sharing and analysis organizations, or ISAOs. But now, the hard part begins: defining the job and getting it done.
Europe's vaunted data protection regulations - now 20 years old - are in desperate need of an update. In 2012, EU officials proposed extensive changes to the privacy rules, but they remain stuck in limbo. Here's why.
An upcoming series of summits on fighting financial fraud and mitigating advanced persistent threats will provide timely insights from industry thought leaders on the critical steps to take to address emerging risks.
Prime Minister David Cameron has cited televised crime dramas to justify his push to expand Britain's surveillance laws and collect bulk Internet and mobile usage data. But does cop show fiction square with surveillance fact?
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
In the wake of an "inebriated" government employee crashing a drone on the White House lawn, federal officials sound warnings over the potential weaponization of consumer drones. But is it anything more than a Hollywood-style movie plot?
Grocery chain Schnucks has won a court ruling against its payments processor and merchant bank, setting a $500,000 cap on how much it must pay for a 2012 POS breach. Learn how imprecise contract terms played an important role in the ruling.
President Obama urged Congress in his State of the Union address to pass legislation to better meet the evolving cyberthreat, but spent very little of the speech explaining its dangers or detailing his cybersecurity legislative agenda.
North Korean leader Kim Jong-un was set to star in a satirical video game, in which he battled the forces of imperialist oppression with the help of unicorns and narwals - until hackers apparently disrupted game development.