LATEST FEATURES

Case study: Hawaiian Telcom says aloha to AlienVault security management

Case study: Hawaiian Telcom says aloha to AlienVault security management

The IT staff at a Honolulu-based telecommunications company went looking for a security management platform for its managed network and security services. It found what it needed.

Can one CISO ever beat an army of IoT devices?

Can one CISO ever beat an army of IoT devices?

The security threat from the Internet of Things (IoT) has grown real because far too many of those sneaky IoT devices fly in under the radar. Corporate maintenance, facilities and operations departments are not accustomed to requesting IT's signoff on purchasing light bulbs or door locks. And yet, when those devices have their own independent - or dependent - communications capabilities, they are an easy backdoor for cyberthieves.

Waiting for DDoS

In football, many offensive plays are designed to trick the defense into thinking something else is about to unfold.

Pit road for the network: Case study

Pit road for the network: Case study

Seeking to protect its intellectual property, race car team Andretti Autosport went looking for a security solution.

Women to watch

We selected seven women whose achievements struck us as not only remarkable but deserving of wider recognition.

Women of influence

Women of influence

These eight women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.

Equality revolution

Equality revolution

The pace may be slow but we're moving forward. We explore gender diversity and more in our third annual Women in Security issue.

Where are they now?

Where are they now?

Executive Editor Teri Robinson caught up with a few women we've honored in the past to see how their careers - and the security landscape - have changed.

That '70s show: Sexual harassment

That '70s show: Sexual harassment

New legislation and evolving corporate policies are fighting back against online harassment, reports Doug Olenick.

Equal? Not quite

Equal? Not quite

It's time to broaden the concept of what a career in information security looks like, particularly for women, reports Teri Robinson.

Sign up to our newsletters

TOP COMMENTS