An (ISC)2 survey suggests that a Commission on Cybersecurity for the 44th Presidency paper backs a government-run board to oversee IT security certifications, a point disputed by the report's author. Where does the truth lie?
Key factors making the security landscape riskier are the rapid rise of social networking, the growing reliance on cloud computing and the growing sophistication, criminalization and organization of hackers, a new survey shows.
The call to aid the devastated country of Haiti came just hours after a 7.0 earthquake hit the impoverished Caribbean island on Tuesday.
Just as quickly as the tweets came in asking for donations, so too came the cyber criminals looking to divert funds from legitimate charities to their own pockets.
The power of social networking web sites can be measured by just looking at the number of hits (or visits) to a person's web page on such well-known sites as MySpace or Facebook.
The negative side web users should consider before placing information on such social networking sites include the connection one...
You know someone. Out of millions of Merrill Lynch customers, you should know at least one. Combine Bank of America's many more millions of banking customers, and you have to know someone. I know quite a few myself. All of these people are waiting to be absorbed into what is ultimately a new regime. This state of...
To me, this is one of the sleeper stories of the year.
The ID Theft Red Flags Rule, Business Continuity and Anti-Money Laundering have dominated the headlines - and banking/security priorities. But recent attention paid to Application Security has the potential to fuel one major fire drill in 2009.