Europe does not know the true extent of its data breach problem, says Europol advisor Brian Honan, owing to the lack of a U.S.-style breach notification law to alert European consumers when their data has been stolen or exposed.
The Internet as we know it may be heading toward fundamental changes in the coming decade as a result of an intense privacy debate, says Internet pioneer and DNS guru, Dr. Paul Vixie. Find out his predictions.
Direct from the show floor at the Moscone Center in San Francisco, ISMG offers for the first time ever a live streaming video feed of exclusive interviews with the world's top information security leaders.
Governance, risk and compliance efforts have failed to evolve in the Indian marketplace, says Vidya Phalke of MetricStream. He believes most organizations lack a proper framework, and they must build a robust GRC culture.
At the heart of recent high-profile breaches ... is phishing. Why can't we get a handle on these schemes and get better at stopping them? PhishMe CEO Rohyt Belani on how to strengthen security's weakest link.
Ann Barron-DiCamillo discusses how DHS is standing up the National Cybersecurity and Communications Integration Center to serve as the portal for the government and businesses to share cyberthreat information.
The threat landscape has changed dramatically, and so must organizations' approach to cybersecurity. Jim Anderson of BAE Systems Applied Intelligence lays out the elements of the new cybersecurity agenda.
Most organizations are still doing poor jobs of adequately communicating threat information, even within their own organizations. Shawn Henry, President of CrowdStrike, offers strategies for the C-suite.
The new Identity Ecosystem Framework is ready for review. What do security professionals need to know? Kimberly Little Sutherland of LexisNexis Risk Solutions shares insights on the future of online identity.
As mobility cements itself as the ubiquitous technology of choice, the threats are evolving - and so must the defenses. Christy Wyatt of Good Technology on the future of enterprise mobility management.
As RSA Conference 2015 opens, ISMG's editorial team discusses the event's emerging themes and how they will be reflected in event coverage. What will be the key sessions and discussions in San Francisco?
(ISC)Â²'s seventh security workforce study says APAC CISOs opt for outsourcing of security, given technology sprawl, new threats and lack of in-house skills. Regional experts respond to these findings.