By Rick Kam 05:03 pm April 20, 2016
The Department of Homeland Security (DHS) has officially launched the mechanism for sharing threat intelligence, known as the Automated Indicator Sharing (AIS) initiative. The government has said that the AIS will serve as the Internet's "See Something, Say Something."
By Rick Kam 08:11 am March 25, 2016
Both the Cybersecurity Act of 2015 and the Apple-FBI conflict have catapulted the privacy-security debate into headlines. Here's a look at what to know now about those.
By Rick Kam 07:56 am March 18, 2016
A new law aims to reduce cybercrime but, at the same time, raises the old argument about how much is too much when it comes to personal privacy.
By Rick Kam 12:59 pm January 20, 2016
Here are six steps to making sure even those employees least concerned with privacy and security don't expose your health data.
By Rick Kam 12:26 pm January 07, 2016
Defenders of privacy and security found 2015 a most challenging year. With no obvious end in sight, these trends are likely to continue, but 2016 will present some new challenges across all industries, including healthcare.
By Rick Kam 09:49 am November 16, 2015
While cyber-attackers are becoming ever sophisticated at stealing information from business systems, gaining entry into those systems is relatively easy because employees, vendors and sometimes customers are not very sophisticated at keeping them secure.
By Rick Kam 08:28 am October 19, 2015
The days of James Bond and his world-saving exploits are over. In today's reality, nation-states and their criminal partners can disrupt commerce and defenses in the free world from the safety and comfort of their computer desks.
By Rick Kam 10:03 am October 05, 2015
Most people navigate the World Wide Web via well-known search engines such as Google or Bing. Underneath the publicly accessible web, however, is the "Deep Web," the part of the web that is not indexed by common search engines.
By Rick Kam 11:05 am September 15, 2015
If you're concerned with data security or privacy these days -- and who isn't? -- you need to understand the fast-changing world of cyber-crime, cyber-terrorism and cyber-espionage.
By Rick Kam 03:42 pm August 26, 2015
In many organizations today, incident response is run like a relay race, typically starting with information security and with each response function handing off to the next in sequence. With each leg, the clock is ticking, and at each handoff, vital information may be lost.