The U.S. educational system is failing to address the rising demand for computer-savvy students, and the result is evident in the increasingly bigger and more serious data breaches.
Blocking access to sensitive data by mobile workers in the end is counterproductive. Instead, it’s better to protect data by incorporating better access controls in the technology itself.
Predictions are easy; accurate predictions are harder. Here’s how we did last year in predicting cybersecurity trends for 2013.
The Cloud Security Alliance and SAFECode have identified best practices for developing applications that meet the unique security requirements of cloud computing.
The National Infrastructure Protection Plan being developed by DHS is intended to help define and facilitate a voluntary alliance between government and private infrastructure owners.
NIST continues to expand security guidance for government and private-sector IT systems that choose to use it, in spite of Congress' inability to pass cybersecurity legislation.
A report from the EastWest Institute's recent summit on cooperation in cyberspace suggests a model for easing the poisonous relationship that is growing between two cyber superpowers.
A proposal for accurately measuring the scope of cybersecurity problems and charting progress is being presented at the EastWest Institute's international summit on cyberspace.
The past month of problems and de-bugging on the Affordable Care Act portal has not been so bad, if you think of it as a beta.
A survey of federal security people and end users produces interesting -- but not surprising -- results: The rift between users and defenders is undermining cybersecurity.