LATEST FEATURES

The agency that stepped up: Federal Trade Commission

The agency that stepped up: Federal Trade Commission

The Federal Trade Commission (FTC) has become the de facto enforcer of data privacy laws and regulations, reports Lee Sustar.

Malware on the move: Mobile malware

Malware on the move: Mobile malware

Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.

Closing the gate: Data leak prevention

Closing the gate: Data leak prevention

Even when you've got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.

The whole package: Security certifications

The whole package: Security certifications

Security certifications can land you a better job, but companies are also looking for people who can communicate and manage projects, reports Steve Zurier.

Help wanted: Hiring crisis

Help wanted: Hiring crisis

Recruiters say that corporations and government need to rethink their defenses to address critical talent shortages, reports Larry Jaffee.

Defense from the top: FISMA

Defense from the top: FISMA

The DHS will gain more control - and federal cybersecurity likely will be improved - when a FISMA update is passed, reports Lee Sustar.

Cool in a crisis: Breach response

Cool in a crisis: Breach response

How you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard. Larry Jaffee reports.

Unifying principle: Federal data breach law

Unifying principle: Federal data breach law

Is the time right for national data breach legislation? There are signs that this may be the year, reports Steve Zurier.

Reboot 25: Honorable mention

Reboot 25: Honorable mention

Hang around IT security long enough and several of the same names keep popping up. With good reason. They have both vision and influence and they aren't afraid to use them.

Reboot 25: Threat seekers

Reboot 25: Threat seekers

These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.

Sign up to our newsletters

TOP COMMENTS