Industry Insight

Millenials improve security habits, more interested in cyber careers, still need guidance

Millenials improve security habits, more interested in cyber careers, still need guidance

By

Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.

Board-level planning: Tangible metrics can persuade

Board-level planning: Tangible metrics can persuade

Security leaders must create visible value for the organization, says Unisys's Francis Ofungwu.

Becoming a "security thinker"

Becoming a "security thinker"

Active security thinking ensures that we don't simply perpetuate security folklore.

The great communicator: Government policy

The great communicator: Government policy

By

It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Bridging the talent gap in health care

Bridging the talent gap in health care

By

Cybercriminals are primarily after patient data as it really gets them more money.

Company news: New execs at Malwarebytes and an acquisition by VMware

By

The latest mergers and acquisitions and personnel moves, including Malwarebytes, Abacus Group, VMware, Bay Dynamics, vArmour, Secunia, Norse and more.

Me and my job: Michael Canavan, Kaspersky Lab North America

Me and my job: Michael Canavan, Kaspersky Lab North America

We catch up and learn a bit more about Michael Canavan, senior director, systems engineering, Kaspersky Lab North America.

Skills in demand: Communications and messaging experts

Skills in demand: Communications and messaging experts

The demand for infosec-focused communications and messaging pros is growing.

Falling off the 'Wagon of Things'

Falling off the 'Wagon of Things'

The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?

Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring and filtering

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

NIST taps MITRE to support National Cybersecurity Center of Excellence

By

The contract includes initial tasks totaling $29 million, the U.S. Commerce Department's NIST said.

Breach shaming and the need for a new model to discuss data breaches

Breach shaming and the need for a new model to discuss data breaches

The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.

BadUSB: The unusual suspect

BadUSB: The unusual suspect

When security research like the most recent one regarding BadUSB announced by SR Labs appeared, security experts and vendors usually take two sides.

Report: Intrustion prevention systems made a comeback in 2013

Report: Intrustion prevention systems made a comeback in 2013

By

A new report indicates that intrusion prevention systems grew 4.2 percent in 2013, with growth predicted to continue.

Mobile device security sacrificed for productivity, study says

Mobile device security sacrificed for productivity, study says

By

A Ponemon Institute study, sponsored by Raytheon, revealed that employees increasingly use mobile devices for work but cut corners and circumvent security.

IBM opens cloud resiliency center in N.C.

By

The center will help enterprises avoid costly disruptions caused by cyber incidents and natural disaster.

Veracode receives $40M in late-state funding

By

The Burlington, Vt.-based web and mobile application security firm announced that it closed on $40 million in a late-stage funding round.

Retail trade association appoints new VP of cybersecurity

By

The Retail Industry Leaders Association announced the appointment of Nicholas Ahrens as the new head of cybersecurity for the trade group.

Google acceleration of SHA-1 deprecation draws resistance

Google acceleration of SHA-1 deprecation draws resistance

By

Google said Chrome 39, to be released within 12 weeks, will treat some sites as untrusted, accelerating the transition and user woes.

When is a control not a control?

When is a control not a control?

When the entire network is down, the smart CIO is already on the phone to the CFO with an explanation, says David Sheidlower, global head of information security, BBDO Worldwide.

Plan ahead: Prepare for the inevitable data breach

Plan ahead: Prepare for the inevitable data breach

By

The best strategy to manage the inevitable data breach of your enterprise is to be prepared, reports Adam Greenberg.

Smart defense: A talk with industry veteran Gene Fredriksen

Smart defense: A talk with industry veteran Gene Fredriksen

By

Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.

Game theory: Cyber preparedness

Game theory: Cyber preparedness

By

Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.

Security assessment stability

Security assessment stability

We should be asking if it is worth the cost of constantly switching security assessment companies, says Ken Stasiak CEO, SecureState.

Encryption: A brief history of our secret keeping

Encryption: A brief history of our secret keeping

While the history of encryption is long, its widespread use is a fairly recent phenomenon.

Study: Organizations lack training, budget to thwart insider threats

Study: Organizations lack training, budget to thwart insider threats

By

Of the 355 IT and security professionals surveyed, a majority indicated that they were ill-equipped to thwart a possible insider threat.

The 'human firewall': a more proactive approach to infosec

The 'human firewall': a more proactive approach to infosec

The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?

Symantec rolls Norton solutions into single suite

By

In a move to keep up with the evolution of connected devices, Symantec has announced that its Norton security software will be rolled into one suite.

Weak password trend persists in the enterprise, study says

By

Trustwave's "2014 Business Password Analysis" indicates that strong authentication policies have yet to be implemented at organizations.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US