After the revelation of Operation Aurora, the term began to take on a different meaning. "In essence," IBM's X-Force report says, "APT became associated with any targeted, sophisticated or complex attack regardless of the attacker, motive, origin or method of operation."
Three recent breach incidents, each involving the loss or theft of back-up drives, illustrate that some organizations are doing a better job than others in informing consumers about the steps they're taking to prevent more breaches.
Emerging technologies, application vulnerabilities and regulatory compliance force organizations to bridge the development and security silos and find avenues for interdisciplinary cooperation to produce secure software.
In today's world, where certain data must be let in so governments and businesses can realize their missions, firewalls must be able to see the content flowing through networks, NIST Computer Scientists Tim Grance and Murugiah Souppaya say.
In case you weren't one of the more than 31,000 who attended this year's Healthcare Information and Management Systems Society Conference in Orlando, here's a rundown of some of the privacy and security news from the show.
Once a CEO understands the value and risks catered through mobile functionality, it is easier to discuss mobile innovations, policy and how the company can then strike a balance to meet customer and employee requirements.