LATEST FEATURES

Reeling in workers: Social engineering

Reeling in workers: Social engineering

Successfully defending against socially engineered phishing campaigns means addressing both technological and human vulnerabilities. Doug Olenick reports.

Top to bottom assurance

Top to bottom assurance

When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.

No business like breach business

No business like breach business

Repeated exposure of private data is giving rise to a new class of companies promising to clean up the mess - and they don't come cheap. Lee Sustar reports.

Sweet validation: Apple versus FBI

Sweet validation: Apple versus FBI

CISOs say the Apple-FBI case confirms the need for strong encryption and IT security programs. Steve Zurier reports.

Unsuitable addendum: Wassenaar Arrangement

Unsuitable addendum: Wassenaar Arrangement

A contentious amendment to an international export treaty has been causing an uproar in the security communities, reports Karen Epper Hoffman.

Market forces: Supply and demand

Market forces: Supply and demand

The market, not government regulation, will push IoT security to a higher standard, says John Ellis of Ellis & Associates. Lee Sustar reports.

Educating boards

Educating boards

C-suites and boards of directors are increasing their knowledge of IT security risks and needs - before a breach happens. Larry Jaffee reports.

Briefs: Company news, April 2016

Briefs: Company news, April 2016: Personnel moves and M&A activity in the IT security industry

Threat of the month: April 2016

Chinese firmware

News briefs: April 2016

Breaking news from the IT security industry: personnel moves, mergers and acquisitions, and other happenings.

Sign up to our newsletters

TOP COMMENTS