Today's ISMG Security Report leads off with House Homeland Security Committee Chairman Michael McCaul and DHS Secretary Jeh Johnson lamenting about the congressional bureaucracy that hinders passage of needed cybersecurity legislation.
Why are ATMs a top target for fraudsters? In an interview, Shirley Inscoe, a financial fraud expert and analyst at Aite Group, offers insights based on a new study and predicts the surge in skimming will continue next year.
Cyber espionage and other increasingly sophisticated nation-state cyberattacks will escalate into what amounts to "cyberwar" in 2017, predicts security expert Michael Bruemmer of Experian Data Breach Resolution.
Cyberattacks waged by organized crime groups are simultaneously targeting a wider array of industries worldwide, which is why cross-industry threat information sharing is more critical than ever, says Brian Engle, executive director of the Retail Cyber Intelligence Sharing Center.
The latest ISMG Security Report leads with a look at the ransomware attack against San Francisco's light rail agency. Also featured is an analysis of the ongoing fallout from Australia's online census project.
Healthcare entities must perform security due diligence when they consider introducing emerging technologies - including "internet of things" devices - into their environments, says attorney Stephen Wu, author of a new book on HIPAA compliance.
Soltra Edge, the automated threat intelligence sharing platform that had been slated to be phased out, has been rescued by NC4, a cyber threat intelligence firm that has purchased the platform, Bill Nelson of FS-ISAC explains in this exclusive audio interview.
In September, the annual G20 summit - the gathering of leaders from 20 major global economies- was held in China. NSFOCUS was selected to provide security protection. Guy Rosefelt discusses that mission and its unique challenges.
So, if 2016 was the year when mobile security threats finally started to materialize and mature, what can we expect to see in 2017? Tom Wills of Ontrack Advisory shares insight on the mobility threatscape and new enterprise solutions.
The latest ISMG Security Report leads with a look at how to protect patient data should President-elect Donald Trump and the Republican-led Congress follow through with their promise to dismantle Obamacare. Also featured is a discussion of whether IoT security should be regulated.
Highlighting the latest ISMG Security Report: National Institute of Standards and Technology's Ron Ross explains how a new approach employing engineering principles can be used to build secure, trustworthy systems. Also, when a ransomware attack is deemed a breach.
An analysis of how the Donald Trump administration will address health IT security and privacy leads the latest edition of the ISMG Security Report. Also, the ramifications of a big breach, and an FBI agent tackles ransomware.
The breach of Democratic Party computers led to the release of a trove of emails embarrassing to Hillary Clinton that might have swayed the election. Should the IT security community fess up? Also, top government cybersecurity policymakers assess President-elect Donald Trump as an IT security influencer.
Donald Trump pledges to conduct a review of U.S. cyber defenses and vulnerabilities as one of his first acts as president. Melissa Hathaway, who led a similar review for Barack Obama nearly eight years ago, says it's important for an incoming president to get the lay of the land.
Two NIST initiatives aim to close the cybersecurity skills gap. One is an interactive, online tool known as CyberSeek; the other is updated guidance known as the NICE Cybersecurity Workforce Framework. In this audio report, NICE Director Rodney Petersen explains the connection between the two.