Policies form the cornerstone of the information security program and are instrumental for enforcing global consistency, driving change and launching enterprise programs.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
The head of the NSA, the entity many consider to be the prime culprit in the “surveillance state,” sought to persuade the crowd at the annual DefCon hacker gathering to enter government service.
Unauthorized information disclosure via “paste” sites has been a common occurrence as a part of recent high-profile information security breaches.
The Cybersecurity Act of 2012 was defeated in the Senate, FinFisher spyware analyzed, nation-state-created espionage malware Gauss, and other breaking security news