Misogyny in business, overall, is a problem. In IT and IT security, it's a bigger one, says SC Magazine's Illena Armstrong.
Among the humdrum there are cyber events cropping up here and there that breed excitement.
Offering up more general guidelines to strengthen the country's critical infrastructure security - as in the president's recent executive order - is all well and good, but without any meaningful and enforceable requirements then, really, what's the point?
I was dismayed and disturbed by the suicide of Aaron Swartz, which only added to well-rooted revulsion for the relentlessness of legal actions against him.
As we start 2013 off, I'm pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
From stealthy to blatant tactics, 2012 has seen them all.
Among the some 400 attendees at last month's SC Congress New York, fears bandied about crossed various spectrums.
Isn't Wyndham Hotels and Resorts culpable for failing to enlist industry standards and implement security practices and tools to protect customer accounts?
President Obama now is considering an executive order to breathe some life back into the Cyber Security Act of 2012 with the goal in mind to protect the country's critical infrastructure.
Yahoo presumably took no measures to ensure sensitive stuff like customer account credentials were kept safe and sound.
The latest evidence of cyber espionage weaponry could be a harbinger of nation-state assaults to come.
Mobile security problems continue to vex many an IT security officer.
Is health care a last frontier for today's cyber criminals?
There are a whole host of things driving budget, resources and tweaks to security/risk management programs.
U.S. agencies argue that monitoring social media will arm them with "situational awareness" to thwart potential attacks.
The FTC settled a case with Upromise after it failed to encrypt information and provide details about its data collection practices.
Nearly two-thirds of respondents to our fifth annual "Guarding Against a Data Breach" survey say their budgets related to IT security and data protection will remain the same this year.
At no time in our history have we seen individuals and organizations so dependent on IT.
Security experts believe that robust risk management programs should be a pillar of business planning, says SC Magazine Editor-in-Chief Illena Armstrong.
Being prepared, yet nimble, is key to a well-designed mission, says Illena Armstrong, SC Magazine's editor-in-chief.
Transparency after a breach does more than save face.
With data breaches becoming an everyday occurrence, technologies that help to minimize online fraud are more indispensable than ever, says Illena Armsttrong, editor-in-chief, SC Magazine.
CISOs must concede they eventually will see their infrastructures compromised.
There probably always will be some indifference to breach notifications, but I'd like to hope that today's average, technology-reliant consumer isn't blissfully trusting that businesses and the government have their best interests in mind.
The recent social engineering attack on RSA has dominated industry talk, with some dubbing coverage of the incident a media circus.
Despite the lip service given to the nebulous concept of partnerships between public and private entities, what really has seen the light of day?
Executives are poised to accept the additional expenses required to deploy evolved security solutions as they experience cost savings and increased productivity by relying on the cloud or mobile devices.
No matter your view of Julian Assange, his WikiLeaks controversy is the story that just keeps on giving, says Illena Armstrong, editor-in-chief, SC Magazine.
One of the findings in SC Magazine's fourth annual "Guarding Against a Data Breach" survey is that you can get compliant with a sound security program in place, but you might not necessarily get security with a compliance-based plan.
With people out of work, insider threats spike and budgets often plummet, says Illena Armstrong.
Chicken Little could relate to the likely thoughts of all those cybersecurity players who have warned time-and-again that it isn't a matter of 'if' cyberwar would occur but 'when.'
Snoop Dogg reportedly told a group of reporters on a Symantec 18-wheeler, no less, that he's "not with" online crime.
Yet another data breach notification law at the federal level has been introduced into the U.S. Congress.
A company new to the information security marketplace is reportedly outsourcing its software development for both its consumer and enterprise security solutions to programmers in China.
The SC Magazine Awards have been going strong for years now.
Optimism, no matter how dosed with skepticism, feels right following the appointment of Howard Schmidt as the nation's cyber coordinator, says SC Magazine Editor-in-Chief Illena Armstrong.
Whatever it is you're looking for, we're hoping you'll find it either in the pages of the magazine or on our website.
Education, whether through a university, a professional industry body or a long-standing private organization is essential, says Editor-in-Chief Illena Armstrong.
A balance between basic civil rights and national security must be struck
Awareness training really can help to make security a part of corporate cultures.
Just as Queen and David Bowie were in 1981, chief information security officers today are under pressure. Surprise, surprise, right?
With the start of our next year, we're looking for some signs of revitalization.
We and the industry of which we are a contented part, have flourished over these last 20 years.
Information security as an industry sees a profusion of mergers and acquisitions. But one interesting effect from it is the need to re-evaluate the variety of business practices under which each individual business once operated before the transaction, so that refinements and more sweeping changes can be implemented and followed after they merge.
In this month's cover story, we hear from one of our SC World Congress keynote speakers, Heartland Payment System's CEO Robert Carr
Government entities are likely ill-prepared for a coordinated cyberattack.
Preventing access to Web 2.0 sites altogether isn't the right move.
Information security is still in its formative years. But, as executive leaders' understanding of the need to integrate security strategies into their business plans matures, the IT security professional's role presumably expands in importance. As it turns out, such an evolution is happening in some organizations
Congress needs to do what's necessary to help NERC call electric power officers to task and get the power systems they own and operate secured as fully as possible.
A leader is needed, deft at working with private companies, to protect critical data.