The center will help enterprises avoid costly disruptions caused by cyber incidents and natural disaster.
The Burlington, Vt.-based web and mobile application security firm announced that it closed on $40 million in a late-stage funding round.
The Retail Industry Leaders Association announced the appointment of Nicholas Ahrens as the new head of cybersecurity for the trade group.
Google said Chrome 39, to be released within 12 weeks, will treat some sites as untrusted, accelerating the transition and user woes.
When the entire network is down, the smart CIO is already on the phone to the CFO with an explanation, says David Sheidlower, global head of information security, BBDO Worldwide.
The best strategy to manage the inevitable data breach of your enterprise is to be prepared, reports Adam Greenberg.
Today's CISO must stay ahead of attackers, says Gene Fredriksen, CISO at PSCU. Teri Robinson talks one on one with the industry veteran.
Business leaders are beginning to fathom the importance of cyber war game simulation exercises, reports James Hale.
We should be asking if it is worth the cost of constantly switching security assessment companies, says Ken Stasiak CEO, SecureState.
While the history of encryption is long, its widespread use is a fairly recent phenomenon.
Of the 355 IT and security professionals surveyed, a majority indicated that they were ill-equipped to thwart a possible insider threat.
The high price of defending against cyber attacks exposes an age old problem in information security: how do you balance security requirements with maintaining your business's bottom line and ability to deliver service?
In a move to keep up with the evolution of connected devices, Symantec has announced that its Norton security software will be rolled into one suite.
Trustwave's "2014 Business Password Analysis" indicates that strong authentication policies have yet to be implemented at organizations.
The relationship between development and security doesn't need to be hostile, and there are ways to engage developers more with security.
A group of security pros called "I am The Cavalry" introduced a five star automotive cyber safety program.
In an effort to bolster security on the web, Google has announced that it will boost the search engine ranking of sites that use HTTPS encryption by default.
In this video, Jay Radcliffe, senior security researcher at Rapid7, discusses his recent work and how the industry needs to get ahead of the game when it comes to medical device security.
In this video, Joshua Corman, CTO at Sonatype, chats with SC Magazine's Danielle Walker on his involvement in some important upcoming initiatives.
Speaker Jason Healey warned that the internet can only endure so much abuse before it's irreversibly damaged.
On Wednesday, Dan Geer delivered his keynote called "Cybersecurity as Realpolitik" at Black Hat.
The experts we spoke to for this new ebook agree that when deciding what data must be encrypted, it's a question of classifying it by level of importance.
As chief policy officer of HackerOne, Katie Moussouris oversees the company's philosophy and approach to vulnerability disclosure, advises customers and researchers, and as she puts it, "works toward the public good to legitimize and promote security research to help make the internet safer for everyone."
The Black Hat conference schedule no longer includes sessions on home insecurity and dissecting the Snake malware campaign.
In 2010 Wendy Nather joined 451 Research as a senior analyst, and she now serves as research director for the information security practice covering many different areas, with a heavy focus on application security, security services and threat intelligence.
As both the CTO and the SVP for products at HyTrust, as well as more recently its head of engineering and CISO, Hemma Prafullchandra is also "an evangelist for what's possible."
As VP and CISO at Freddie Mac, Patricia Titus is responsible for the protection and integrity of the mortgage company's information assets while enabling world-class information access.
These seven women are featured for their noteworthy efforts, which have impacted the field of online security and data privacy for the better.
Here's a list of five notable women to watch who have had a positive impact on the information security industry.
We asked a number of security professionals what they thought about the conditions for women in the IT security workplace today.