Prosecutors love to tell judges that sentences for hackers and cybercriminals must be strong enough to deter future such crimes. But as the case of Silk Road mastermind Ross Ulbricht shows, they've failed to make the case for deterrence.
It's no surprise that virus-wielding hackers are exploiting Internet of Things devices. Blame too many device manufacturers rushing products to market, skimping on secure development practices and failing to audit the third-party code they use.
President Obama twice threatened to veto info sharing bills sponsored by Rep. Mike McCaul. So when the Texas Republican backs the Democratic president's plan for a cyberthreat intelligence center, you've got to think it's a great idea. Maybe, maybe not.
President Obama has tapped veteran CIO Tony Scott as the top government IT official whose responsibilities include overseeing agencies' compliance with FISMA, the law that governs federal government IT security.
An upcoming series of summits on fighting financial fraud and mitigating advanced persistent threats will provide timely insights from industry thought leaders on the critical steps to take to address emerging risks.
The sponsor of Senate-approved FISMA reform, Tom Carper, says it's not a done deal because the House has a dispute over which committee - Homeland Security or Oversight and Governmental Reform - has jurisdiction over the legislation.
Barring a catastrophic cyberattack in the next few days to motivate legislators to act, don't expect lawmakers to vote on any cybersecurity bill for the remainder of the current Congress.
Put together, two IRS audits illustrate a major concern many security pros have about FISMA audits: They're checklists of whether organizations comply with regulations that require specific processes but do not determine if the processes are effective.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
The logjam in Congress on passing significant cybersecurity legislation could be broken when Republicans assume control of the Senate next year. Here's why.
A Twitter chat featuring Gartner's Avivah Litan offered a lively discussion of numerous fraud-related issues, including card breaches, weak authentication and the need for mobile scrutiny. We'll host more chats soon.
A Senate committee has approved legislation to reform the 12-year-old law that governs federal information security, plus two other cybersecurity-related bills. The full Senate will now consider the measures.
Effective risk management requires involvement of an organization's top leader; the resignation of Eric Shinseki as secretary of Veterans Affairs means that the VA likely will continue to struggle to comply with federal requirements for IT security.
Legislation before the House to excise from federal law the requirement that NIST work with the NSA on cybersecurity standards wouldn't likely stop the two federal agencies from continuing to collaborate.
As federal regulators weigh changes in the requirements for the HITECH Act electronic health record financial incentive program, it's essential that they adequately address privacy and security issues.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.