NIST is developing risk management guidance on the IT supply chain that says organizations should take an incremental approach and ensure that they first reach a base maturity level in organizational practices.
What top mobile security concerns should organizations be considering? As more devices connect to the enterprise, Akamai's Fran Trentley says there are certain priorities businesses must prepare to address.
National Security Agency Director Keith Alexander declined to say that the agency would stop using contractors in top secret IT positions to prevent a leak such as the one that exposed NSA programs to collect metadata on American citizens.
Financial fraud expert Joe Rogalski explains why card issuers are ultimately responsible for losses linked to ATM cash-out schemes, like the $45 million worldwide cyberheist that made headlines last month.
A House panel establishes a bipartisan supply chain working group to explore the federal government's role in helping industry assure that IT and telecommunications wares they buy abroad are safe from exploits.
A key difference between state-sponsored espionage and organized criminals or hacktivists is the level of persistence and determination to break through defenses. Here's advice from security experts on defending against nation-state attacks.
Federal regulators have issued draft guidance for the use of social media. What are the specific security risks? The FDIC's Elizabeth Khalil discusses how banking institutions can address emerging threats.
CISOs' top three priorities for 2013 are emerging threats, technology trends and filling security gaps, says RSA CISO Eddie Schwartz. But what new strategies should leaders employ to tackle these challenges?
Leaders at four security technology companies say the recent distributed-denial-of-service attacks against 10 U.S. banks highlight the need for new approaches to preventing and responding to online outages.