(ISC)Â² and the Cloud Security Alliance have unveiled a new cloud security professional certification designed to measure advanced competence. Will training for the certification help professionals gain a better understanding of cloud security?
The Department of Defense has unveiled an updated cybersecurity strategy that officially acknowledges for the first time that the U.S. military is willing to use cyberwarfare to defend U.S. interests against cyber-enemies.
Not all threat intelligence is created equally, says Fortinet's John Maddison. And it's not just external threats organizations should be most concerned about. Why more businesses need to focus on inside-out security.
At a time of sweeping change in cybersecurity, attorney Stephen Wu says organizations need to be prepared from a compliance, incident response and risk management perspective to address novel situations stretching society's capabilities.
This year's event was bigger than ever, overwhelming to take in, and no single challenge, strategy or solution emerged as a top priority - very much a reflection of today's information security marketplace.
Despite active attacks against the vast infrastructure that was created to support the 2012 Olympics, the games proceeded without a hitch. But making that happens required unprecedented levels of cross-vendor collaboration, says BT's Jason Cook.
Organizations are at greater security risk than ever, but they also continue to struggle to obtain adequate security staff. Robert Stroud of ISACA offers new recommendations to address the staffing shortage.
As a longtime security leader, Eddie Schwartz has felt acutely the pain of the security skills crisis. Now, as chair of ISACA's Cybersecurity Task Force, he's helping organizations do something about it.
A group of financial institutions affected by the 2013 Target data breach is asking a court to stop the settlement between the retailer and MasterCard that would provide $19 million to card issuers, saying the amount is grossly inadequate.
A breach at St. Vincent Medical Group in Indiana is the latest example of a healthcare organization falling victim to an apparent upswing in phishing attacks targeting employees. And it was the third data breach for the provider organization.
The House on April 23 passed a second cyberthreat information sharing bill, the National Cybersecurity Protection Advancement Act. Now it will be combined with the previously approved Protecting Cyber Networks Act before it's sent to the Senate.
In conducting due diligence, investors spend more time than ever assessing the cyber-risk posed by the company targeted for acquisition, says Jacob Olcott, VP for business development at Bitsight Technologies.