Industry Insight

PCI 3.0: The good, the changes and why it's not ugly

PCI 3.0: The good, the changes and why it's not ugly

The primary challenge to secure payment card data is that too many involved see the PCI DSS as a panacea for every risk in the marketplace.

Study: Third of employees use company devices for social media and online shopping

Study: Third of employees use company devices for social media and online shopping

By

GFI Software and Opinion Matters found that employees used company devices for activities not related to work and had no qualms about stealing company intellectual property after they leave.

NATO launches largest cyber exercise to test its network security

By

With more than 400 technical, government and cyber experts involved, Cyber Coalition 2014 tested the speed of sharing threat intelligence.

Catching up with Yahoo CISO Alex Stamos

By

In this video, Ashley Carman, editorial assistant at SC Magazine, hears about Yahoo's future plans and Stamos' thoughts on the company's responsibility to keep users safe.

Failing the security test: Target wasn't the first failing grade, or the last

Failing the security test: Target wasn't the first failing grade, or the last

It's easy to get hung up on discussions around chip-and-pin, malware and network segmentation, and in the process lose sight of the broader trends that underlie many breaches.

Perimeter defense insufficient, security shifting, report says

By

A report by Ari Kaplan Advisors and sponsored by Nuix found most infosec pros collaborate with data managers.

Four commonly overlooked security gaps

Four commonly overlooked security gaps

If organizations are looking to raise their security profile, they should certainly examine these commonly overlooked areas.

Study: 9 in 10 Americans agree control over personal information is lost

Study: 9 in 10 Americans agree control over personal information is lost

By

A new Pew Research study on Americans' privacy perceptions after the Edward Snowden leaks shows that most people assume their personal data isn't kept private online.

Shaygan Kheradpir, Juniper Networks CEO, resigns

By

Following a review by the board and Kheradpir's involvement in "a particular negotiation with a customer" there has been a shift in leadership at the network services firm.

Combating cyber risk in the supply chain

Combating cyber risk in the supply chain

Everyone involved with vendor management should now develop a common, collaborative security strategy.

A silver lining in the JPMorgan breach?

A silver lining in the JPMorgan breach?

This incident gives the industry hope that proactive measures can stop an attacker before a breach drives catastrophic results.

EFF names new executive director

By

The Electronic Frontier Foundation will have a change in leadership come January as Shari Steele steps down.

IBM previews 2014 CISO survey

By

In this video, Danielle Walker, senior reporter at SC Magazine, gets a sneak peek at an upcoming CISO survey conducted by IBM. Kris Lovejoy, general manager of security services at IBM, discusses the findings.

Major banks team up to fund Soltra Edge threat sharing tool

By

FS-ISAC teamed up with the Depository Trust & Clearing Corp on the Soltra Edge platform which will deliver information on breaches and threats to the financial sector.

Google open sources network traffic security testing tool

By

The tool, called "notogotofail," tests whether devices and applications are secured against known TLS/SSL flaws and misconfigurations.

AccessData to split in two, creates Resolution1

By

The newly created company Resolution1 will be responsible for cybersecurity incident response business.

Safe tether: Wearables

Safe tether: Wearables

By

Wearable devices efficiently monitor user activity, but also open new targets for malware authors, reports Alan Earls.

Privacy and the Internet of Things

Privacy and the Internet of Things

With parameters, new tech can help your business, says McAfee's Jonathan Fox and Tyson Macaulay.

Me and my job: Marisa Fagan, director of crowd operations, Bugcrowd

Me and my job: Marisa Fagan, director of crowd operations, Bugcrowd

This month, we get to know Marisa Faga, Bugcrowd's director of crowd operations.

Company news: Big moves at Veracode, Malwarebytes and CipherCloud

By

The latest news in the security field, including personnel moves and mergers and acquisitions.

The elephant in the room

The elephant in the room

Bring the insider issue into the light and focus on culture change, says PSCU's Gene Fredriksen.

Hackers are after your app

Hackers are after your app

Modern mobile hacks are diverse and can be performed by anyone, from an inexperienced amateur to highly skilled teams operating like tech startups.

Getting executives on board

Getting executives on board

Successful CISOs need to master more than system security to make their companies competitive and improve their own job security.

Finding the right structure

Finding the right structure

By

Some experts contend that a reason for the seeming decline in IT security spend is that it is now becoming a pervasive part of everyday corporate operations.

Selling Snowden-style access: Inside threat

Selling Snowden-style access: Inside threat

Edward Snowden has the same broad access and privileges that many employees in similar positions have at almost every business.

Skills in demand: Biometric security, account executive

Skills in demand: Biometric security, account executive

Good news for those industry pros that specialize in biometric security...you're in demand.

EU conducts massive cyberattack simulation on critical networks

By

Conducted by the European Union Agency for Network and Information Security, the simulation launched 2,000 attacks on the networks of various critical infrastructure organizations.

Report: Stolen card data is crime that concerns Americans most

By

A recent Gallup Crime poll indicates that Americans' top two worries revolve around having credit card data stolen or their computer or smartphones compromised.

How to build a secure fortress

How to build a secure fortress

It's not enough to build a tall wall or dig a deep moat to protect a fortress, an enterprise's network is equally vulnerable without the necessary added layers of security.

Why the Home Depot attack shouldn't have happened

Why the Home Depot attack shouldn't have happened

Major retailers are falling prey to massive credit card information heists, despite spending millions on cyber security systems.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US