Click on a filter below to refine your search. Remove filter to broaden your search.
|Last 12 months||remove|
Hint: If you don't want the words you enter to be searched for separately, use quotation marks to find people or exact phrases. See our Search Help section for more hints.
The rule may help leaders better understand the impact of cyber risks, says PwC's David Burg and Laurie Schive.
While a major attack has yet to take place on the U.S. energy sector, now is the right time for these critical infrastructure providers to ready their defenses.
The document was born out of President Obama's executive order to enhance critical infrastructure protection.
A draft of the voluntary framework was released by NIST in support of President Obama's executive order on critical infrastructure security.
The national and economic security of a nation depends on the reliable functioning of critical infrastructure. The physical and electronic elements comprising critical infrastructure are increasingly and inextricably interwoven. Enemies of the state and others who would benefit from the disruption of critical infrastructure realize this and can turn to...
America's second-largest city, Los Angeles, has announced the creation of its first ever Cyber Intrusion Command Center, intended to combat threats aimed at city services.
Two controversial pieces of privacy legislation have been killed after Canada's prime minister prorogued parliament.
The role of the CISO is rapidly garnering a strategic voice at many organizations.
Applications are the soft underbelly of most organizations. And, because of the nature of applications - they may appear to be working fine -- the extent of their vulnerability is often unclear.
On Wednesday, NIST published the 41-page guidance after months of feedback from the community.
On Tuesday, Senator Dianne Feinstein, D-Calif., revealed that the draft bill was in the works and she planned to move forward with the legislation.
Organizations in the finance, telecommunications, defense, and transportation industries have been targeted by attackers that may be looking to steal valuable information.
Canadian Privacy Commissioner Jennifer Stoddart has called for fundamental reforms to Canada's privacy law that would make companies more accountable for privacy violations.
Like no other year before it, 2013 illustrated for the entire globe just how essential cyber security is to business endurance, economic durability and personal rights to privacy.
The tentative list of incentives would entice companies to participate in the "Cyber Security Framework," a measure that aims to help the nation stave off industrial attacks.
Attackers who raided Google in 2010 to learn information about Chinese human rights activists were also trying to gain insight on which Chinese intelligence agents were on the radar of U.S. authorities, according to a report.
In his keynote address at the RSA Conference in San Francisco, Art Coviello discussed the NSA allegations and also outlined four principles that would serve as a set of standards when it comes to cyber warfare.
Phyllis Schneck takes a level-headed approach to how the DHS should address potential attacks against critical infrastructure.
The power of information as a commodity only continues to deepen as it satisfies so many disparate needs and wants.
We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.