Information security and privacy work in healthcare environments often requires a depth of specialized knowledge and competency that can be validated through the help of professional credentialing, says CISO Sean Murphy.
Women in information security are becoming even more of a minority because of poor treatment and stereotypes, says Professor Eugene Spafford. What's the cost to organizations, and how can they break the mold?
Although European Union leaders expressed concerns about the NSA's surveillance programs to President Obama, that didn't prevent the United States and EU from issuing a communique highlighting cooperation on cybersecurity.
Distributed-denial-of-service attacks are a concern for all organizations. But financial institutions face unique challenges, and so they require a unique level of protection, says Mark Byers of Fortinet.
A report prepared for a Senate committee provides an extensive analysis of how retailer Target Corp. possibly missed several opportunities to prevent the massive data breach that compromised the credit card details of millions of customers.
Mobility has driven the rise of containerization as a security strategy for employee-owned devices. But what about for contractors? Kimber Spradlin of Moka 5 discusses how to mitigate third-party risks.
Palo Alto Networks announces it will acquire the Israeli-based cybersecurity firm Cyvera, continuing the recent trend of mergers and acquisitions among cybersecurity vendors. Find out how much the deal is worth.
Yi-Kai Liu, a computer scientist at NIST, explains how he's attempting to use quantum physics to devise a way to create a one-shot memory device that could help secure, for example, transactions or administrative passwords.
In the wake of recent high-profile breaches at Target, Neiman Marcus and other entities, see the latest research and insight about the broad impact of intense cyber-attacks and how to improve incident response.