Testimony in House Energy and Commerce Subcommittee on Commerce, Manufacturing and Trade hearing aimed at shaping national data breach notification law.
A new report from the Federal Trade Commission (FTC) provides data security steps for businesses and promotes data minimization.
Qualys has identified a buffer overflow vulnerability in the Linux GNU C Library that, if exploited, could enable an attacker to remotely take complete control of a victim's system.
These two areas of the security space are should to bring in some interesting changes in the new year.
Focus: Cyber Threats
Source code for the keylogger, called QWERTY, was published in Snowden documents.
This is another market area that has seen a lot of change over the past few years.
The year's Innovators in this group focus on security management in a cloud or virtual environment.
Data protection is a fuzzy, sometimes nebulous term. Certainly everything we do on the network is intended to protect the data on it. In an era of widely dispersed global enterprise the data often seems to be alone on the internet.
Security infrastructure is another one of those ever-changing categories. What looked like infrastructure a few years ago is, for the most part, long gone.
Hall of Famers are in their third consecutive year of appearing here and that sends the strong message that they are Innovators and they have staying power.
Data Breach Blog
Many states have laws today that require corporations and government agencies to notify consumers in the event of a breach - but it is not enough.