Industry Insight

NYU conference encourages women to pursue cybersecurity

NYU conference encourages women to pursue cybersecurity

By

The NYU Polytechnic School of Engineering hosted a cybersecurity conference to help foster interest in the field among young women and teens.

Yahoo bug bounty program pays out more than $1 million to researchers

By

Yahoo's Interim CEO Ramses Martinez detailed the company's bug bounty program's successes since its creation in 2013.

'GSMem' malware designed to infiltrate air-gapped computers, steal data

'GSMem' malware designed to infiltrate air-gapped computers, steal data

By

Israeli researchers detailed a new attack that can steal data from air-gapped computers, which are often seen as relatively safe.

Survey: Security experts and regular users vastly different in preferred safety practices

Survey: Security experts and regular users vastly different in preferred safety practices

By

A Google survey among security experts and "non-experts" found that both groups operate very differently when trying to keep themselves and their devices safe online.

All smartwatches are vulnerable to attack, finds study

All smartwatches are vulnerable to attack, finds study

By

All ten smartwatches tested by HP Fortify reported significant security vulnerabilities, along with their Android and iOS cloud and mobile application components, according to a new report.

Stephen Scharf named DTCC's first CSO

By

As Stephen Scharf moves into newly created CSO position at DTCC, global CISO Mark Clancy assumes helm as CEO at Soltra.

Study: Half of critical infrastructure IT professionals believe major attack looming

Study: Half of critical infrastructure IT professionals believe major attack looming

By

A survey from Intel Security found that many information security professionals are overconfident in their systems' ability to thwart an attack.

Avoid hiring a cybercriminal: understand motivations and thoroughly vet employees

Avoid hiring a cybercriminal: understand motivations and thoroughly vet employees

By

After a FireEye intern was found selling his own custom RAT on a dark web forum, industry experts reemphasize the importance of understanding cybercrime and how to hire the right people.

Google invests in cybersecurity firm and university IoT project

By

Google Capital funded Crowdstrike during a funding round, and also granted Carnegie Mellon University $500,000.

JPMorgan reassigns CISO a year after major data breach

By

JPMorgan Chase reassigned the executive in charge of network security a year after he was criticized for his handling of a major data breach.

Women in IT Security: 10 Power Players

Women in IT Security: 10 Power Players

By

These 10 women were selected for their longstanding contributions to the IT security space.

Facebook diversity report offers glimpse into tech workforce gaps

Facebook diversity report offers glimpse into tech workforce gaps

By

In the U.S., 51 percent of Facebook tech staff are white, while Black and Hispanic employees respectively account for 1 and 3 percent of tech staff.

Yahoo's Alex Stamos to join Facebook as CSO

By

Alex Stamos, who was appointed CISO at Yahoo last year, will join Facebook as CSO next Monday.

Hack grounds handful of Polish airline's flights

Hack grounds handful of Polish airline's flights

By

Polish airline LOT was attacked by hackers who accessed the company's ground systems responsible for issuing flight plans.

Revenge porn images to be removed from Google Search results upon request

By

Google announced Friday that it will take steps to make revenge porn images inaccessible through its search engine.

Purdue to open STEM-focused high school aimed at inner city youth

By

Purdue Polytechnic Indianapolis High School, set to open in Indianapolis, will focus curriculum on STEM and help inner city students prepare for college.

LinkedIn opts for 'invitation-only' bug bounty program, pays out $65K in recent months

LinkedIn opts for 'invitation-only' bug bounty program, pays out $65K in recent months

By

LinkedIn's director of information security shared that the private bug bounty program was formalized in October.

Choosing the right secure file transfer vendor in today's heightened security & compliance landscape

As mobile technologies, cloud computing, and always-connected environments continue to enable fluid movement of data, organizations must consider solutions that meet both current, and future needs.

SC Congress Toronto: Experts discuss incident response in a breach era

SC Congress Toronto: Experts discuss incident response in a breach era

By

Security leaders shared steps their own organizations have taken to effectively prepare for looming incidents or compromise.

SC Congress Toronto: DDoS trends show SaaS apps, home routers increasingly targeted

SC Congress Toronto: DDoS trends show SaaS apps, home routers increasingly targeted

By

Dave Lewis, global security advocate at Akamai, highlighted attack trends at SC Congress Toronto.

Survey: 75 percent of companies have significant risk exposure

Survey: 75 percent of companies have significant risk exposure

More than 400 security pros from companies of all sizes in 61 countries completed self-assessment tests against NIST Cybersecurity Framework for RSA's Cybersecurity Poverty Index.

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

SC Congress Toronto: IBM's Lodewijkx shares company's guiding security principles

By

During the afternoon keynote at SC Congress Toronto, Lodewijkx shared IBM's guiding principles for mitigating IT security threats.

SC Congress Toronto: Assess business risk before entering cyber insurance market

By

A speaker advised attendees to have a clear understanding of the risk management side of their business, to choose a tailored plan that meets their needs.

Adobe settles class action lawsuit in 2013 breach

By

Adobe has agreed to improve security and pay nearly $1.2 million in legal fees plus $5,000 per named plaintiff in the settlement of class action lawsuit over a 2013 breach.

SC Congress Toronto: The worst of ransomware is yet to come

By

During a panel at SC Magazine's Toronto conference, a panel of IT security professionals discussed ransomware and its possible future iterations.

Apple to require iOS 9 users to use six-digit passwords and two-step authentication

By

Apple will require iOS 9 users to use six-digit passwords and two-factor authentication when signing into Apple services from a new device or browser.

IAPP salary survey shows women in privacy on par with men

IAPP salary survey shows women in privacy on par with men

By

The results of the IAPP's 2015 Privacy Professional Salary Survey showed that women and men in the privacy industry pull down roughly the same salaries and follow similar career trajectories.

Google takes small steps toward diversity

By

Google released its workforce demographics Monday and the company has not made a lot of headway in diversifying its ranks.

Survey: Boards hold CEO most accountable when breaches occur

Survey: Boards hold CEO most accountable when breaches occur

By

A new survey shows board members across several industries are holding more C-level execs responsible in cases of data breaches.

Hiring in information security

Hiring in information security

You can't hire quality information security talent the same way you hire customer service reps.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US