LATEST FEATURES

Zone of protection: Hacker havens

Zone of protection: Hacker havens

To what extent is state-sponsored cybercrime extending the protection for hackers who operate outside U.S. borders? Karen Epper Hoffman investigates.

Make it stop!: Data breaches

Make it stop!: Data breaches

Sharing lessons learned with managers and staff is key to halting breaches, says Lena Smart, CIO, New York Power Authority. Steve Zurier reports.

Taming the third-party threat: Application security

Taming the third-party threat: Application security

The challenge for security practitioners is to make the mobile ecosystem more trustable, reports Alan Earls.

The agency that stepped up: Federal Trade Commission

The agency that stepped up: Federal Trade Commission

The Federal Trade Commission (FTC) has become the de facto enforcer of data privacy laws and regulations, reports Lee Sustar.

Malware on the move: Mobile malware

Malware on the move: Mobile malware

Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.

Closing the gate: Data leak prevention

Closing the gate: Data leak prevention

Even when you've got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.

The whole package: Security certifications

The whole package: Security certifications

Security certifications can land you a better job, but companies are also looking for people who can communicate and manage projects, reports Steve Zurier.

Help wanted: Hiring crisis

Help wanted: Hiring crisis

Recruiters say that corporations and government need to rethink their defenses to address critical talent shortages, reports Larry Jaffee.

Defense from the top: FISMA

Defense from the top: FISMA

The DHS will gain more control - and federal cybersecurity likely will be improved - when a FISMA update is passed, reports Lee Sustar.

Cool in a crisis: Breach response

Cool in a crisis: Breach response

How you communicate during an attack is as important as your response, says Ron Green, CISO, MasterCard. Larry Jaffee reports.

Sign up to our newsletters

TOP COMMENTS