Former Coca Cola CISO Renee Guttmann has joined Accuvant's Office of the CISO.
With each job change, the risk that the new hire will bring confidential information or trade secrets with him or her to the new company grows.
The conference will be anchored by the Maryland Cyber Challenge and Competition, a security job fair, and more.
Hackers only need to find one weak point to steal valuable information. On the flip side, security pros need to account for every possible scenario.
While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.
Black Hat organizers say legal counsel for the Software Engineering Institute and Carnegie Mellon University nixed the session.
This weekend, the digital rights group released a "hacker alpha" version of its Open Wireless Router software.
Microsoft has reconsidered a move to cease security emails in Canada, following the introduction of an anti-spam law north of the border.
Canadian cybersecurity is languishing due to poor communication and disappointing security investments, according to research from the Ponemon Institute.
Oracle, the maker of the popular Java plug-in, recently confirmed the details.
Rather than predicting the next lightning strike it is far better to pay attention to the areas we already know are vulnerable.
Whether it is a database of customer information or valuable intellectual property, an organization's "crown jewels" need to be protected with the most robust security possible.
Microsoft has handed domain control back to No-IP after millions of customers were reportedly impacted by its legal action.
In its quarterly "State of the Internet" report Akamai observed 283 DDoS attacks in the first quarter of 2014.
A combination of fundamental and new strategies provides a winning formula against would-be attackers.
In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.
In August, Dan Geer, CISO at In-Q-Tel, will hit the hacking conference's keynote stage in Las Vegas.
A new initiative aimed at information sharing among the oil and gas industries in relation to cyber threats has been launched Thursday.
A recent study has found a significant gap between perceived risk and the actual safeguarding of sensitive data.
We must prepare for the security considerations when it comes to the looming technological phenomenon that is the Internet of Things.
When you take into account the constantly evolving threat landscape, there's always room for improvement in the cyber security realm.
IBM's global CISO advised security pros on engaging boards of directors about organizational threats.
On Monday, the nonprofit launched its 2014 Summer Immersion Program, impacting 380 high school girls across the country.
A new IBM report reveals that organizations experienced more than 91 million "security events" last year.
The NACD, AIG and the ISA have issued a set of best practices to help boards understand and handle cyber security issues.
In the world of information security, naturally, security is of paramount importance, but control is king.
Audit committees in Canada are falling behind the rest of the world by not spending enough time assessing cyber security, warned a KPMG report this month.
To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.
Radcliffe was named one of 2013's top security thinkers by SC Magazine.
Last week, the developers of the encryption tool announced that the they would no longer maintain the software.