As major cloud vendors, including Salesforce, integrate identity and access management features into their platforms, security professionals must size up the role that stand-alone IAM systems will play in the long run.
NIST is revising its 3-year-old smart-grid guidance to address technological and policy changes that have made the power grid more susceptible to vulnerabilities and threatened utility customers' privacy.
The Army Research Laboratory is collaborating with five research universities on a $23 million, 5-year initiative to develop what's being characterized as a new science to detect, model and mitigate cyber-attacks.
Purdue University's Eugene Spafford discusses the ethical issues that have been brought to the forefront by former NSA contractor Edward Snowden's leaks of classified details on a number of top-secret government surveillance programs.
In releasing the preliminary version of the cybersecurity framework, the head of NIST re-emphasized the voluntary nature of the guide, but he said critical infrastructure operators have a responsibility to adopt the recommended best practices.
Organizations collect a wealth of information as part of their governance, risk and compliance programs, and security professionals are missing out on important insights if they don't take advantage of it.
What's it take to succeed as an information security leader? J.J. Thompson of Rook Consulting, Malcolm Harkins of Intel and others offer insights on the growing number of skills that are now essential.
The partial government shutdown caused NIST to miss the deadline for publishing a preliminary version of the cybersecurity framework, but the agency expects to meet the February deadline for releasing the final version.
Learn why Frederick Chang, the new head of the cybersecurity program at Southern Methodist University, says the time has come to create a "science of security" that abandons the current reactive strategy.
New revelations about how the National Security Agency collects and uses e-mail and instant-messaging contact lists demonstrate bad data governance practices that raise serious concerns, a leading privacy attorney says.