Phil Reitinger, CEO of the Global Cyber Alliance, a group he describes as a "coalition of the angry," describes how it has channeled this anger into action and tells why he believes the U.S. is in step one of a 12-step cybersecurity program.
Brigadier General (retired) Gregory Touhill was the first federal CISO of the United States. Fresh from that role, he opens up on the state of federal cybersecurity and what the new administration should do to enhance protections.
Are there rules in cyberspace? There aren't many, but Microsoft is proposing a "Digital Geneva Convention" that would set some internet norms for countries to help prevent unfair targeting of civilians.
U.S. Rep. Michael McCaul says Washington must accept that we are losing on the global cyber battlefield. But the Homeland Security Committee chairman contends the Trump administration has the opportunity to turn the tide by prioritizing cybersecurity and investing the right resources in partnerships and defense.
Information Security Media Group has a team of editors covering RSA Conference 2017. What are the hot topics from the show floor? Who are the key thought leaders on camera in ISMG's video studio? See and hear highlights from the first two days of the event.
Evil hackers with monomaniacal intentions have long dominated pop culture sensibilities. But when it comes to for-profit hacking, cybercrime predominantly remains a business-driven concern, says Trend Micro's Ed Cabrera.
The cost upsides of writing code that's as free from bugs as possible has long been known, says Veracode's Chris Wysopal, but bugs continue to plague production code. Thanks to the rise of agile programming, however, there are new opportunities to eradicate flaws during development.
Dan Holden, a cybersecurity researcher and technologist, has just taken on the new role of CTO and intelligence director at the Retail Cyber Intelligence Sharing Center. What top challenges is he addressing?
Art Coviello, retired chair of RSA, discusses the state of cybersecurity in 2017, including the threats - and threat actors - of greatest concern and the emerging security technologies that encourage him the most.
Gartner's Avivah Litan is just back from a trip to Israel, and she's particularly enthusiastic about the new topic of "offensive defense." What is the concept, and what security controls does it require?