CSC's Sam Visner sees organizations, in growing numbers, thinking more intelligently about cloud computing, its security and architecture. Yet, he says, they're being very deliberate in their approach in adopting cloud computing.
The benefits from employing social media as a way to connect with stakeholders outweigh the risks, says David Bradford, the editor of a new survey of risk managers. Still, he says, the risks must be adequately addressed.
Now that Congress has failed to enact significant cybersecurity legislation, President Obama needs to find new ways to secure key government and business IT systems, says Melissa Hathaway, a former top White House cybersecurity adviser.
Microsoft says its next version of the Internet Explorer web browser will feature "do not track" as a default user setting. What are the online privacy implications? Trevor Hughes of the IAPP weighs in.
When it comes to breach planning and response, well-intentioned organizations often go wrong. Experian Data Breach Resolution VP Michael Bruemmer tells where they fail and offers advice on how to do these important jobs right.
RSA CISO Eddie Schwartz says he spends more time talking to other chief information security officers and IT security practitioners today than he did a decade ago, when he held the same job at Nationwide Insurance Co.