By being transparent, federal government agencies can minimize public concern that government monitors individual speech and action on social media, new guidance from the U.S. federal CIO Council advises.
The apparatchiks at the Kremlin think they're clever sorts with plans to replace computers with typewriters to prevent the American e-spies at the National Security Agency from hacking into Russian intelligence systems.
Angered over the Edward Snowden revelations, DEF CON says the feds should take a 'time-out' from this year's hackers' conference. But a top DHS cybersecurity policymaker says he's still invited to participate in a conclave panel discussion.
As they develop mitigation strategies, organizations must keep in mind that all cyber-attacks, ranging from DDoS to phishing, ultimately aim to compromise data - and they virtually all are advanced and persistent.
When President Obama comes face to face with China's President Xi Jinping, don't expect the American commander in chief to present an ultimatum over Chinese cybersecurity assaults on critical U.S. IT systems.
Providers of technologies employees acquire through unconventional channels that could bypass their employers' supply-chain controls are known as "shadow suppliers." Here's why you should care about them.
A recent $1 million cyberheist at a county hospital illustrates why healthcare organizations must pay attention to securing financial as well as clinical data - and educate staff about how to recognize phishing e-mails.