In this month's debate, experts discuss the possible issues that the Internet of Things presents for the industry.
In this month's debate, experts discuss whether more guidance on security career opportunities for youths will alleviate the skills gap.
In this month's debate, experts discuss whether the biometrics on Apple's iPhone 5s will evolve the security of personal devices.
In this month's debate, we received a number of responses to our debate topic this month, which covers the NSA's attempts to crack encryption methods.
In this month's debate, experts discuss whether the Computer Fraud and Abuse Act is out of date, and if punishments are disproportionate to offenses.
A number of experts weighed in on this month's debate concerning a statement from DefCon founder Jeff Moss that feds should stay away from DefCon.
In this month's debate, two experts discuss whether security training is an effective strategy in the workplace.
Experts in this month's debate discuss Java. Is it time to stop using the popular software?
Experts from SilverSky and Adobe Systems debate on whether or not software developers are incentivized to improve security.
In this month's debate, experts discuss if advanced malware is still a persistent challenge after administrator rights are removed.
In this month's debate, two experts discuss whether or not China is the top cyber threat to the United States.
This month's featured debate informs whether the FTC should have the right to penalize companies for poor data security/privacy practices.
This month's debate covers Hacktivist group Anonymous. Will they take a backseat to more extremist groups in 2013?
Comprehensive cyber security legislation (or a presidential executive order) will happen in 2013.
Debate: A White House order on cyber security would be a step in the right direction for safeguarding networks.
Debate: Flame, Stuxnet and other APTs are hype, but you should still be extremely worried.
Debate: In light of recent breaches, passwords remain a useful method for authentication.
Featured Debate: HTML5 is eroding website security.
Debate» Sharing security data is the best way to raise the cost of entry and lower ROI for criminals and spies.
Debate: Identifying the culprits behind Koobface will diminish the gang's activity.
Debate: Anti-virus is essential.
The attack du jour, APTs, or advanced persistent threats, are real threats.
Debate: M&A activity in the cyber security arena will significantly increase in 2012.
Debate: The Stuxnet authors are behind the Duqu trojan.
Edy Almer, vice president of marketing and business development at Safend debates Rich Baich, principal at Deloitte & Touche.
Operation Shady RAT, a cyberespionage offensive chronicled by McAfee, is a botnet.
Two security experts duke it out over whether organizations should invest in user awareness training.
Debate: Increased penalties for violations of the Computer Fraud and Abuse Act should be enacted into law.
The federal breach notification law, proposed by President Obama, should replace existing state laws.
The U.S. government was justified to take control of Coreflood bot servers.
Debate: Mobile app stores should test and certify before making apps available to customers.
Two sides weigh in on whether so-called do-not-track applications, which monitor consumers' online behavior, should be regulated.
Two sides weigh in on whether the federal government should become involved in the distribution of certifications for security professionals.
Organizations will be better able to handle data breaches in 2011.
Free anti-virus software is as effective in protecting users as a paid solution.
Encryption is better equipped than tokenization to secure data in the cloud.
Users reject security advice because it requires too much effort for too little reward.
This debate pits Don Erickson director, government relations, Security Industry Association (SIA) against Lee Tien, senior staff attorney, Electronic Frontier Foundation (EFF).
Debate: Software vendors should "partner" with pirates to fight unlicensed software use.