Most organizations remain uncomfortable in letting their employees use their own mobile devices to access their IT systems. Yet, in many instances, those charged with securing their enterprises' IT understand that it's just a matter of time before they must grant workers permission to employ those devices.
Results from HealthcareInfoSecurity's inaugural survey show regulatory compliance being the No. 1 information security priority for the coming year. What steps should organizations start taking before regulatory audits begin?
Too many of today's firewalls are out of date and opening organizations to unacceptable business risks, says Chris King of Palo Alto Networks.
So, how do we quickly get to the next-generation firewall - and what are the key qualities it will need to embrace?
In an interview about the future of firewalls, King...
Senate Majority Leader Harry Reid, in a letter, informed Minority Leader Mitch McConnell of his decision to bring cybersecurity legislation to the floor during the first work period of 2012 legislative session.
Banks, government agencies and healthcare providers have upped their efforts to assist consumers after an ID theft incident. But much more needs to be done. One ID-theft recovery expert shares her thoughts about areas in need of improvement.
Pennsylvania fined former CISO Robert Maley $10,000 for having vendors pay for his travel, meals and lodging to industry events as well as playoff baseball tickets, violations of a state ethics code, the state Ethics Commission reports.
Sutter Health, an integrated delivery system that was in the process of encrypting all its desktop computers, reports that a device that had not yet been encrypted was recently stolen, affecting more than 4.2 million patients.
The Department of Health and Human Services should provide regularly updated, detailed guidance on all aspects of HIPAA security rule compliance, the Privacy and Security Tiger Team plans to recommend.
Unfortunately, says Ken Vander Wal, most organizations have done little to address security in their policies and procedures regarding BYOD, which is changing the ways companies address user behavior and risk.