Gov. Nikki Haley realizes the potential political consequences of a breach, which explains why she held three press conferences on three consecutive days to address her administration's response to a computer breach of the state's tax IT system.
Both candidates have made fleeting references to cybersecurity during the presidential campaign, but neither has addressed the matter in detail. How different would a President Romney be from a second-term President Obama?
A key aim of the Next Generation Cyber Initiative has been to expand the FBI's ability to quickly define 'the attribution piece' of a cyberattack to help determine an appropriate response, the FBI's Richard McFeely says.
President Obama has not yet reviewed the draft of a proposed executive order to create a process to establish IT security best practices that private owners of critical infrastructure could voluntarily adopt, DHS Secretary Janet Napolitano says.
What is the focus of new guidelines from the PCI Security Standards Council on mobile payment acceptance security? The council's Bob Russo and Troy Leach discuss key objectives - and what's coming next.
Do we have any reason to believe that any targeted banking institution will be better prepared next week to ward off a distributed denial of service attack like those that rocked three banks this week?
"Any bug, beacon or backdoor put into our critical systems could allow for a catastrophic and devastating domino effect of failures throughout our networks," says Mike Rogers, chairman of the House Select Committee on Intelligence.