The Data Security Act of 2015, approved by the House Financial Services Committee, would create a national data breach notification requirement and spell out data security standards businesses must follow, usurping 47 state laws.
Australian police have raided the Sydney home of cryptographer and entrepreneur Craig Wright, who's been named as being the suspected creator of the bitcoin cryptocurrency. Has the real "Satoshi Nakamoto" finally been unmasked?
He'd spent nearly 15 years in information security, then realized we needed to change our fundamental approach. Why did Art Gilliland, CEO of Skyport Systems, bet his career on this notion? And how is it paying off?
Amidst a perfect storm of circumstances, how will CISOs ensure that they remain relevant? Is outsourced security and MSSP dependence going to take over? Or are virtual CISO specialists going to rule the roost?
Hundreds of millions of PCs are at risk of being remotely exploited, after a security researcher released proof-of-concept exploit code for separate, newly discovered flaws in software preinstalled on systems by Dell, Lenovo and Toshiba.
Amidst the tragedy of the urban flooding disaster in Chennai, businesses running critical operations are turning to business continuity management to resume operations. Thought-leader and former CISO Vishal Salvi shares advice.
President Obama's remarks urging "high-tech and law enforcement leaders to make it harder for terrorists to use technology to escape from justice" are being interpreted by some to mean that government and Silicon Valley should collaborate to create a backdoor to circumvent encryption on devices used by terrorists.
The government of India reports an increase in the annual number of cybersecurity incidents. But what is being done to curb this increase? Security experts offer their recommendations for tracking and reducing these crimes.
Vivian Poon, head of Network Security Operations at UBS, sees the need to encourage women to take up new roles in risk management, governance, security and forensics. How does she recommend recruiting these new professionals?
Dorkbot - one of the world's most prevalent crimeware toolkits - has been disrupted by an international law enforcement and security research firm effort. But similar previous disruptions have failed to eradicate the malware.
Turns out electronic learning products can be bad for children's privacy - and for their parents too. The VTech breach highlights how, despite repeated warnings, too many manufacturers continue to not take security seriously.
Top American and Chinese government officials, meeting this week in Washington, agreed to create a common understanding on cyberthreats and how to respond to them, but the two sides offered different characterizations of the tone of the dialogue.
The breach of Hong Kong toymaker VTech highlights security experts' growing concern over manufacturers selling devices - for enterprises, medical purposes, schools as well as homes and now toy boxes - that don't appear to be secure by design.
Consultant, venture capitalist, retired chairman of RSA. Art Coviello plays many roles, and through them he has a unique view on how the information security marketplace is taking shape for 2016. Who does he see as the winners and losers?
Indian enterprises are increasingly vulnerable to cyber fraud, according to Kroll's new Global Fraud Report. But too many of these organizations rely solely on a reactive approach to fraud, says Kroll's Reshmi Khurana.