We talk increasingly about what we have in common - global risks, threats and growing an effective security workforce. But what are the unique characteristics of individual marketplaces? That's a question I hope to answer this week in London.
What's the cost to an organization when it suffers a security breach and breaks trust with its own customers? Jeff Hudson, CEO of Venafi, presents results of a new survey on the cost of failed trust.
What can organizations do to improve security after a network attack? Post-breach investigations help security leaders trace steps and strengthen weak points, says investigator Erin Nealy Cox.
Internet visionary Vint Cerf sees the development of strong authentication for the billions of devices connected to the Internet as the IT security community's next big challenge.
Consumer advocate Deven McGraw describes how a new federal rule spells out four factors that must be weighed in a risk assessment to determine if a health data breach must be reported.
The HIPAA Omnibus Rule includes three new considerations for determining potential civil monetary penalties following a breach investigation. What are the implications for breach prevention strategies?
Debate over cybersecurity bills last year coupled with recent, highly publicized attacks have raised the visibility of the threat, and that could push Congress to enact IT security legislation in 2013, White House Cybersecurity Coordinator Michael Daniel says.
The HIPAA Omnibus Rule stresses the need for business associates to adequately safeguard patient information. What are the implications? Here's what a federal privacy officer and a consumer advocate have to say.
Four years after the Commission on Cybersecurity for the 44th Presidency, the panel's co-chair - Harry Raduege - is cautiously optimistic that many of its recommendations could be adopted in 2013.
How is the six-hospital Barnabas Health delivery system tackling the challenge of complying with the new HIPAA Omnibus rule? Hussein Syed, director of IT security, explains.
Homeland Security Deputy Undersecretary Mark Weatherford says the federal government will provide appropriate funding to keep the federal government IT secure even if President Obama and Congress fail to prevent automatic, across-the-board budget cuts scheduled for March 1.
CISOs looking for a way to build credibility with senior executives - and win funding for important projects - need to drop the "just say no" approach and build a reputation as a team player, says security professor Ray Davidson.
The PATCO fraud case shows why banking institutions cannot rely on compliance to ensure security. In an RSA 2013 preview, attorney Joseph Burton discusses legal lessons from the PATCO settlement.
Our RSA panel features the NIST thought-leader responsible for its information risk publications along with top IT security practitioners who take NIST guidance and make it work. See how they do it.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.co.uk, you agree to our use of cookies.