The U.S. migration from magnetic-stripe payment cards to EMV-compliant cards is in full swing, thanks in part to massive breaches at retailers. This infographic offers a timeline of progress in implementing this new technology.
Information security experts are calling on Google to rethink its patch priorities after it declines to fix a critical component that runs on Android 4.3 "Jelly Bean" and older devices, leaving an estimated 930 million mobile devices at risk.
President Obama's call for enactment of a national data breach notification law has been widely welcomed by business groups and privacy advocates, but their endorsements come with a big proviso: What's in it? The White House hasn't furnished details.
A new law in New Jersey, enacted in reaction to data breaches, requires health insurers that provide coverage in the state to encrypt personal information, going beyond the addressable requirements of HIPAA.
U.S. Central Command's Twitter and YouTube accounts were hacked Jan. 12, reportedly by ISIS sympathizers. The account compromises came the same day President Obama proposed new cybersecurity measures, including a national breach notification law.
Following the Paris attacks, Britain's prime minister hopes to reintroduce a controversial surveillance bill known as the "Snooper's Charter." Meanwhile, many European countries - and the U.S. - plan to increase anti-terrorism collaboration.
The Paris terrorist attacks could make it more likely Congress will renew the USA Patriot Act and less likely that lawmakers will curtail a program to collect metadata on telephone conversations of Americans.
Healthcare organizations looking for help building an integrated approach to privacy and security compliance will soon have a new tool available. Find out the details about an updated framework from HITRUST.
In the wake of the Paris massacre, the head of Britain's MI5 domestic intelligence agency has called for new powers to fight extremism, warning that as terror plots increase, communications-interception capabilities are decreasing.
Nobody wants to be a cyber-attacker's first victim. But there are benefits to being second or third, says Akamai's Mike Smith. Then you get to enjoy the true benefits of the oft-discussed information sharing.
Leading this week's industry news roundup, BAE Systems launches a corporate security analysis service to assist companies with social risk monitoring, while Arbor Networks appoints its first chief technology and security officer.
FBI Director James Comey's Jan. 7 defense of the bureau's attribution of the Sony Pictures hack to North Korea hasn't silenced many information security experts, who argue that the scant evidence divulged to date proves nothing.
French authorities continue to investigate the Jan. 7 attack in Paris that claimed the lives of a dozen, including journalists and police officers. Information security experts say that cyber-forensic skills are crucial for finding the perpetrators.
With the FBI reportedly investigating whether any U.S. financial services firms waged illegal hack-back efforts after DDoS attacks, some security experts contend that hacking back is a bad idea because the cyber-retaliation could cause more problems.