At the heart of recent high-profile breaches ... is phishing. Why can't we get a handle on these schemes and get better at stopping them? PhishMe CEO Rohyt Belani on how to strengthen security's weakest link.
Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information.
The threat landscape has changed dramatically, and so must organizations' approach to cybersecurity. Jim Anderson of BAE Systems Applied Intelligence lays out the elements of the new cybersecurity agenda.
Most organizations are still doing poor jobs of adequately communicating threat information, even within their own organizations. Shawn Henry, President of CrowdStrike, offers strategies for the C-suite.
The new Identity Ecosystem Framework is ready for review. What do security professionals need to know? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.
As mobility cements itself as the ubiquitous technology of choice, the threats are evolving - and so must the defenses. Christy Wyatt of Good Technology on the future of enterprise mobility management.
As RSA Conference 2015 opens, ISMG's editorial team discusses the event's emerging themes and how they will be reflected in event coverage. What will be the key sessions and discussions in San Francisco?
A House committee approved on April 15 a national data breach notification bill, but the committee chairman concedes that the legislation isn't quite ready for a vote by the full House of Representatives.
After a three-year delay, federal regulators remain tight-lipped about when the next round of HIPAA compliance audits will begin. But a variety of HIPAA-related guidance is in the works, a government official reveals at the HIMSS15 conference.
The PCI Security Standards Council has published a new version of its data security standard that calls for ending the use of the outdated Secure Sockets Layer encryption protocol that can put payment data at risk.
After beating back amendments by Democratic members to limit liability protections for businesses, the House Homeland Security Committee on
April 14 unanimously approved cyberthreat information sharing legislation on a voice vote.
At an April 12 workshop during the HIMSS 2015 Conference in Chicago, security experts, including Mark Dill of the Cleveland Clinic, offer timely insights on how to improve breach prevention and response.