Cyber criminals typically will move on to a target that is much less secure but those behind advanced persistent threats will spend months if not years trying to penetrate an IT system until they succeed, says Dmitri Alperovitch, McAfee Labs threat research vice president.
In its second report card on the Obama Administration's privacy policies, the Electronic Privacy Information Center points out what it sees as many shortcomings, saving its harshest criticism for the area of civil liberties.
When will federal regulators draft long-awaited privacy and security rules for personal health records? So far, officials at the Department of Health and Human Services are being tight-lipped on the subject. Asked about the status of the rules, which, under the HITECH Act, were due in February, an HHS spokesman would...
C. Warren Axelrod is a veteran banking/security executive and thought-leader, and in an exclusive interview at the RSA Conference 2010 he discusses top security trends and threats, including:
Axelrod is currently executive advisor for the Financial...
Application security is rapidly becoming the next hot focus area for information security professionals.
Momentum began to build in 2008, when Information Security Media Group's (ISMG) Application Security Survey showed that 90% of respondents saw application security as somewhat or a significant part of their...