Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.
Security leaders must create visible value for the organization, says Unisys's Francis Ofungwu.
Active security thinking ensures that we don't simply perpetuate security folklore.
It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.
It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.
Cybercriminals are primarily after patient data as it really gets them more money.
The latest mergers and acquisitions and personnel moves, including Malwarebytes, Abacus Group, VMware, Bay Dynamics, vArmour, Secunia, Norse and more.
We catch up and learn a bit more about Michael Canavan, senior director, systems engineering, Kaspersky Lab North America.
The demand for infosec-focused communications and messaging pros is growing.
The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?
Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.
The contract includes initial tasks totaling $29 million, the U.S. Commerce Department's NIST said.
The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.
When security research like the most recent one regarding BadUSB announced by SR Labs appeared, security experts and vendors usually take two sides.
A new report indicates that intrusion prevention systems grew 4.2 percent in 2013, with growth predicted to continue.
A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.
The center will help enterprises avoid costly disruptions caused by cyber incidents and natural disaster.
The Burlington, Vt.-based web and mobile application security firm announced that it closed on $40 million in a late-stage funding round.
The Retail Industry Leaders Association announced the appointment of Nicholas Ahrens as the new head of cybersecurity for the trade group.
Google said Chrome 39, to be released within 12 weeks, will treat some sites as untrusted, accelerating the transition and user woes.
When the entire network is down, the smart CIO is already on the phone to the CFO with an explanation, says David Sheidlower, global head of information security, BBDO Worldwide.
The best strategy to manage the inevitable data breach of your enterprise is to be prepared, reports Adam Greenberg.
Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.
Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.
We should be asking if it is worth the cost of constantly switching security assessment companies, says Ken Stasiak CEO, SecureState.
While the history of encryption is long, its widespread use is a fairly recent phenomenon.
Of the 355 IT and security professionals surveyed, a majority indicated that they were ill-equipped to thwart a possible insider threat.
The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?
In a move to keep up with the evolution of connected devices, Symantec has announced that its Norton security software will be rolled into one suite.
Trustwave's "2014 Business Password Analysis" indicates that strong authentication policies have yet to be implemented at organizations.