President Obama faces a dilemma in deciding whether to prohibit the National Security Agency from tinkering with encryption as one way to collect intelligence data from adversaries who threaten to harm America.
In a speech revealing new limits on the way intelligence agencies collect telephone metadata, President Obama also announced a comprehensive review of how government and business are confronting the challenges inherent in big data.
From new malware to the Target breach, cyber-attacks reached an all-time high in 2013, says Cisco's Annual Security Report. Cyberthreat expert Levi Gundert tells how organizations can regain the advantage in 2014.
Investigations and lawsuits are piling up for breached retailers Target Corp. and Neiman Marcus. Meanwhile, card-issuing banks say fraud patterns may reveal additional breaches at other well-known brands.
A bill that backers say would fortify the IT security of the nation's critical infrastructure and government by codifying, strengthening and providing oversight of the mission of the DHS has cleared its first hurdle.
The House of Representatives approved its second bill within a week that contains provisions for bolstering HealthCare.gov security. Passage came the same day as two more Congressional hearings on HealthCare.gov security.
Because of increasing cyber-attacks against government agencies, the inspector general says it's crucial for the State Department to address the continuing weaknesses in its information security program.
First Target, then Neiman Marcus; who's next? And while banking institutions await the next attack, how should they respond to customers' anxious questions about this latest round of high-profile retail data breaches?
Privacy issues involved when patients authorize individuals to securely access electronic health information on their behalf are among the topics the Privacy and Security Tiger Team will tackle this year. Also, find out about the team's change in leadership.