Industry Insight

Report: Stolen card data is crime that concerns Americans most

By

A recent Gallup Crime poll indicates that Americans' top two worries revolve around having credit card data stolen or their computer or smartphones compromised.

How to build a secure fortress

How to build a secure fortress

It's not enough to build a tall wall or dig a deep moat to protect a fortress, an enterprise's network is equally vulnerable without the necessary added layers of security.

Why the Home Depot attack shouldn't have happened

Why the Home Depot attack shouldn't have happened

Major retailers are falling prey to massive credit card information heists, despite spending millions on cyber security systems.

Securonix taps former BofA exec for chief scientist role

By

Igor Baikalov was appointed chief scientist at security intelligence firm Securonix.

Amit Yoran promoted to RSA president

By

Following his time as RSA's senior vice president of products, Amit Yoran will be promoted to the company's president.

Heartbleed, Shellshock and POODLE: The sky is not falling

Heartbleed, Shellshock and POODLE: The sky is not falling

While it may seem like 2014 is the year of the vulnerability, in reality, this year has not been much different than years past.

ISSA tackles workforce gap with career lifecycle program

ISSA tackles workforce gap with career lifecycle program

By

On Thursday, the group launched its Cybersecurity Career Lifecycle (CSCL) program.

NICE Conference & Expo to be held in Columbia, Md.

By

The conference will cover the future of cybersecurity education in the U.S.

Franchises to get assistance on cybersecurity strategy

By

The National Cyber Security Alliance has teamed up with the International Franchise Association to promote cybersecurity awareness among franchise businesses in the U.S.

Proofpoint acquires Nexgate for $35 million

By

The recent acquisition will allow Proofpoint customers to further secure their social media accounts.

Federal Trade Commission appoints new chief technologist

By

The government agency has announced Ashkan Soltani as its new chief technologist, according to a release.

Cisco supply chain CSO talks cradle to grave security

By

Edna Conway, Cisco's global supply chain CSO, spoke at SC Congress NY with a panel of experts.

Online fraud detection: Three recommendations

Online fraud detection: Three recommendations

Fraud managers have the thorny task of safeguarding their organizations and its customers against fraudsters. New best practices in online fraud detection (OFD) have emerged that advocate a "five layer model."

Cisco announces winners of Security Grand Challenge

By

Cisco unveiled the winners of three Security Grand Challenges and announced a fourth challenge, aimed at women.

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected devices

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

Former RSA CISO named president and COO of White Ops

By

Eddie Schwartz has been appointed the new president of the New York City-based online fraud company.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other advanced groups

By

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem now

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Transparency reports useful, but more info needed on 'digital searches'

Transparency reports useful, but more info needed on 'digital searches'

By

Transparency reports are common these days, but the information they provide can still be difficult to read and understand.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?

Report examines cloud-based security market drivers, concerns

Report examines cloud-based security market drivers, concerns

By

NSS Labs highlighted the growth of security-as-a-service (SaaS) vendors, and issues facing the market.

Symantec splits into two companies

By

As rumors swirled, Symantec announced that it would become two companies, one focused on security and the other on information management.

White House head of cybersecurity suggests selfies as password alternative

By

Rather than staying true to the password as the primary security method, Michael Daniel, White House cybersecurity coordinator, suggested biometrics or even selfies as an alternative.

CISO: same title, new opportunities

CISO: same title, new opportunities

Despite big responsibilities compounded by a string of headline-grabbing data breaches, the skies are looking brighter for CISOs.

Frequency analysis: an efficient, effective approach to network defense

Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.

ISACA announces entry-level cybersecurity certificate

By

A new cybersecurity certificate has been launched by global IT association ISACA that's intended for those looking to break into the field.

Millennials improve security habits, more interested in cyber careers, still need guidance

Millennials improve security habits, more interested in cyber careers, still need guidance

By

Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.

Board-level planning: Tangible metrics can persuade

Board-level planning: Tangible metrics can persuade

Security leaders must create visible value for the organization, says Unisys's Francis Ofungwu.

Becoming a "security thinker"

Becoming a "security thinker"

Active security thinking ensures that we don't simply perpetuate security folklore.

The great communicator: Government policy

The great communicator: Government policy

By

It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US