If you'd like to avoid being subjected to a federally mandated biennial data security audit for the next 20 years, you might want to make sure no one in your organization is using peer-to-peer networks.
A successful effort to build a corporate culture that values privacy should be built on ideas that come from the rank-and-file staff in all departments, says Jan Hillier, a specialist in managing change.
Members of Congress have again expressed concerns about security measures at TRICARE, the military health program, in the wake of a September 2011 breach, and officials with the program have agreed to a briefing.
Brighton and Sussex University Hospitals NHS Trust is appealing a Â£325,000 fine for a breach involving hard drives containing healthcare information on tens of thousands of individuals that were sold on the Internet.
IT security practitioners realize much value from the monthly cybersecurity index created a year ago by Mukul Pareek and Dan Geer. Why? They benefit from knowing how others see the evolving threat environment.
President Obama ordered increasingly sophisticated cyberattacks to cripple Iranian nuclear enrichment centrifuges as part of a major expansion of America's first persistent use of cyberweapons, according to a new report.