Just recently we witnessed the U.S. House of Representative pass two bills aimed at bolstering the security operations of the nation's critical infrastructure.
It's more than a trend. Mobile devices are becoming the new enterprise desktop. But mobile devices require the same security considerations to access corporate intranets or securely sending and receiving email.
Security and privacy professionals employ enumerable solutions and techniques for information security. Yet, the target of the protection, sensitive and private data, is not clearly understood.
The ISA99/IEC 62443 portfolio of standards has emerged as a leading framework for cybersecurity in ICS and SCADA and was referenced in the recent Presidential Framework.
The company received more than 100,000 government requests for customer data last year.
Healthcare IT professionals deal with an increasing array of critical security issues that involve privacy, BYOD and network access, managing live-saving medical devices, and ensuring compliance federal regulations.
Yelp will pay $450,000, and TinyCo will pay $300,000 to settle charges that their mobile apps collected information from children under the age of 13.
The top Democrat on the House Oversight and Government Reform Committee asked for a hearing to investigate the CHS breach.
Documents provided by Edward Snowden reveal that the NSA is looking to build a near real-time map of every single internet-connected device in the world.
The Federal Bureau of Investigation has announced that it is prepared to roll out its new fully operational facial recognition system.
Mark Marmilev pleaded guilty on Thursday for his part in a money laundering conspiracy.
Microsoft continues to fight an order requesting it to turn over customer emails stored in a data center in Ireland.
On July 9, 2014, the Cybersecurity Information Sharing Act (CISA) passed the Senate Intelligence Committee in a 12-3 vote. The legislation encourages threat information sharing between government and the private sector
Administrator Marilyn Tavenner will have to testify in front of the House Committee on Oversight and Government Reform on Sept. 18.
More than 40 civil liberties groups are urging Senate leaders to pass legislation that would put a halt to the NSA's data collection practices.
Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.
Revelations of government surveillance are fueling a paranoia that isn't going to subside. Kate O'Flaherty asks whether firms should be afraid of adopting cloud?
Under the agency's COPPA ruling, website that collect personal information on its young users must receive parental consent before doing so.
Timothy DeFoggi, who was nabbed by the FBI last year in its Operation Torpedo investigation was convicted by federal jury in Nebraska.
The bill would prevent companies from selling students' data and profiting from it.
More than 1,000 analysts at 23 U.S. government agencies have had access to more than 850 billion records courtesy of NSA's ICREACH, a search engine similar to Google.
Starting July 2015, all smartphones sold in the state must come with the anti-theft technology.
Claiming funding from the federal government and an endorsement by President Obama, a debt relief program coerced private data from consumers.
The Metropolitan Police have reportedly lobbied for two years to enact the standard.
GMR Transcription Services in California agreed to settle FTC charges related to its security practices.
The Associated Press was denied a request made under the Freedom of Information Act for documents that contain security information on HealthCare.gov.
The NSA program, called "MonsterMind," is reportedly being developed by the intelligence agency.
The task force will examine the use of the technology by foreign intelligence agencies and criminals targeting Americans.
The National Bureau of Investigation (NBI) warned that the incident showcases the growing incidence of ATM skimming fraud.
The DEA paid an unnamed Amtrak secretary more than $850,000 for passenger information that it could have attained for free.
After a disastrous rollout of healthcare.gov, the White House has put together a team of private sector gurus to improve federal websites.
In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.
Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.
Two USIS clients, the Department of Homeland Security and the Office of Personnel Management, have suspended their contracts as a result of the incident.
The nonprofit group which run Wikipedia was notified by Google of links removed from its search results.
The guidance gives federal agencies improved assessment procedures for securing their information systems and networks.
Sen. Patrick Leahy introduced an NSA reform bill that would update the USA Freedom Act.
One bill aims to improve agencies' website security, while another works to thwart critical infrastructure attacks.
In a recent report, a House of Lords subcommittee called the "right to be forgotten" law unenforceable.
A report by Brian Krebs detailed the intrusions, which occurred between Oct. 2011 and Aug. 2012.
A federal court in New York issued default judgments against 14 companies and individuals who allegedly operated the scams.
The bill is set to be introduced on Tuesday.
Bloomberg says the Japanese government is eyeing cyber security legislation to make companies 'fess up to security incidents impacting users.
The conference will be anchored by the Maryland Cyber Challenge and Competition, a security job fair, and more.
The two-week exercise, "Cyber Guard 14-1," was completed this month.
Almost one in four employees at Canada's Justice Department fell prey to internet phishing in an exercise last December.
Much to the chagrin of privacy advocates and other security experts, the Cybersecurity Information Sharing Act of 2014 passed the Senate Intelligence Committee last week.
In a Tuesday hearing, a Senate subcommittee heard testimony from government and private sector security experts over the botnet explosion.
Stephen Su is accused of accessing U.S. firms' systems, including defense contractors Boeing and Lockheed Martin.
Cryptolocker is effectively non-functional and unable to encrypt newly infected computers, according to a status report filed by the Justice Department on Friday.
In 2013, the banking trojan was deemed one of the most active banking trojans by Dell SecureWorks.
The Cybersecurity Information Sharing Act of 2014 encourages threat information sharing between government and the private sector.
On Tuesday, the telecom giant published its second transparency report on government requests for customer data.
CrowdStrike revealed that the attack group is now targeting sensitive data about political affairs in Iraq.
The FISMA reform act, which eases reporting requirements and clarifies the roles of DHS and OMB, easily passes the Senate Homeland Security and Governmental Affairs Committee.
The legal fight stems from a 2013 request by the Manhattan district attorney, seeking data from the Facebook accounts of 381 people.
Privacy advocates say the Wednesday ruling will have a positive impact on forthcoming cases involving data security.
Google sent its first emails today informing individuals that their requested links were being taken down in accordance with Europe's "right to be forgotten" decision.
In what might be the broadest data breach legislation yet, Gov. Rick Perry signed a set of bills that impose stringent requirements on businesses.
A California Senate Bill curbing "illegal and unconstitutional collection" of data is two steps away from law after a vote by the state assembly's Public Safety Committee.
On Thursday, the House voted to block NSA from funds that support its warrantless search of Americans' communications.
An online polling site intended to gauge the support for universal suffrage in Hong Kong was been hit by a large DDoS attack Tuesday.
Under investigation is FTC's relationship with security firm Tiversa, which provided the agency evidence in an ongoing data security case.
Lawmakers back the spirit of the Privacy Alerts Bill 2014, which carries hefty fines for delinquent organizations, but called for further clarification.
Seeking an end to phone spam, otherwise known as robocalls, the FTC is hosting three standalone contests at DefCon 22.
Glenn Greenwald's new book recounts the human drama of his collaboration with Edward Snowden, the widespread sweeping up of communications and the consequences of the U.S. surveillance state.
Hogan Lovells will represent the government of the Bahamas following reports by The Intercept that the NSA had been recording all cell phone conversations made into, out of, and within the island country.
Canada's federal privacy commissioner has been replaced in a move that has sparked criticism from activists, academics and political leaders.
A day after reiterating a March order that put a halt to the NSA destroying data, a federal judge, citing national, reverses his decision.
A Florida judge sided with the ACLU on Tuesday and ordered that a testimony on the police use of "stingray" devices be unsealed.
A 14-count indictment against the suspected botnet administrator, Evgeniy Bogachev of Russia, was unsealed on Monday.
It was while working with an elite group of cyber forces in the military that Col. (Retired) Barry Hensley realized the severity of security issues facing this nation.
This month's news briefs cover the Heartbleed bug, a Microsoft fix for IE, and more.
New government standards promise to address risk and improve online security for critical infrastructure, reports Karen Epper Hoffman.
The government may impose visa restrictions on Chinese nationals who are scheduled to attend the upcoming Black Hat and DefCon security conferences.
A privacy watchdog in Luxembourg will head up an investigation into the massive eBay data breach which may have affected as many as 145 million customers.
Groups that once backed the bill say that it has been "gutted," and no longer can reform NSA's mass collection of phone records.
Virginia Governor Terry McAuliffe named members of the Virginia Cyber Security Commission on Friday, which was formed to improve cyber security in the state.
The NSA, as well as the Electronic Frontier Foundation, has responded to an article that states the federal agency is recording all cell phone calls in the Bahamas.
An international effort involving law enforcement agencies in 17 different countries has led to nearly 100 arrests of BlackShades users.
A review into the institute's cryptographic standards and guidelines program by a panel experts assembled by the Visiting Committee on Advanced Technology.
The federal agency posted an online listing saying it is looking to purchase malware from a commercial supplier and is now accepting applications.
The law takes effect on July 1, 2015, and would require all smartphones in the state to have a kill switch installed in case of theft.
According to Trend Micro, the public sector has remained a top target of cybercrime.
Last month, it was revealed that the U.K. tax agency was considering selling the anonymized, financial data of millions.
The Office of the Australian Information Commissioner (OAIC) will shut down next year, after nearly five years, due to government budget cuts.
On Wednesday, NIST announced the developing standards, along with a public draft on the measures, which is now open to public comment.
Testifying before a House committee, the Comptroller General said the DHS remains on the high-risk list but is moving clear progress.
The agreement marks the largest HIPAA settlement to date.
The decision pertains to a case between FTC and LabMD, a company accused of violating data security standards after suffering a breach.
Apple schools law enforcement and government agencies in how to ask for data and says it will notify customers of the requests.
On Wednesday, the House Judiciary Committee unanimously approved the USA Freedom Act in a 32-0 vote.
The agency has issued a lengthy warning to investors about the dangers of virtual currency, specifically Bitcoin.
The Australian Defence Force plans to take advantage of cyber warfare as means of taking "offensive" actions against adversaries during military conflict.
The subcommittee will hold a hearing on Thursday on electromagnetic pulse (EMP) attacks.
A Virginia man has been charged with conspiring to hack the computer systems of over 30 public and private entities, including the U.S. Navy.
The White House released a report reviewing Big Data and privacy concerns, and a major recommendation was that national data breach legislation be passed.
The Obama administration is interested in giving the opportunity to a smaller private vendor.
China-based actors may have maintained access for as long as a year, according to new reports.
This Tuesday, two major cases are expected to go before the country's highest federal court.