Edna Conway, Cisco's global supply chain CSO, spoke at SC Congress NY with a panel of experts.
Fraud managers have the thorny task of safeguarding their organizations and its customers against fraudsters. New best practices in online fraud detection (OFD) have emerged that advocate a "five layer model."
Cisco unveiled the winners of three Security Grand Challenges and announced a fourth challenge, aimed at women.
It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.
Eddie Schwartz has been appointed the new president of the New York City-based online fraud company.
The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.
As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.
Transparency reports are common these days, but the information they provide can still be difficult to read and understand.
We are now in the fast lane towards a driverless future. Will we have to brake for hackers?
NSS Labs highlighted the growth of security-as-a-service (SaaS) vendors, and issues facing the market.
As rumors swirled, Symantec announced that it would become two companies, one focused on security and the other on information management.
Rather than staying true to the password as the primary security method, Michael Daniel, White House cybersecurity coordinator, suggested biometrics or even selfies as an alternative.
Despite big responsibilities compounded by a string of headline-grabbing data breaches, the skies are looking brighter for CISOs.
Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.
A new cybersecurity certificate has been launched by global IT association ISACA that's intended for those looking to break into the field.
Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.
Security leaders must create visible value for the organization, says Unisys's Francis Ofungwu.
Active security thinking ensures that we don't simply perpetuate security folklore.
It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.
It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.
Cybercriminals are primarily after patient data as it really gets them more money.
The latest mergers and acquisitions and personnel moves, including Malwarebytes, Abacus Group, VMware, Bay Dynamics, vArmour, Secunia, Norse and more.
We catch up and learn a bit more about Michael Canavan, senior director, systems engineering, Kaspersky Lab North America.
The demand for infosec-focused communications and messaging pros is growing.
The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?
Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.
The contract includes initial tasks totaling $29 million, the U.S. Commerce Department's NIST said.
The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.
When security research like the most recent one regarding BadUSB announced by SR Labs appeared, security experts and vendors usually take two sides.
A new report indicates that intrusion prevention systems grew 4.2 percent in 2013, with growth predicted to continue.