Industry Insight

Accuvant taps Coca Cola CISO Guttmann as VP

By

Former Coca Cola CISO Renee Guttmann has joined Accuvant's Office of the CISO.

Unfair competition:  Proactive preemption can save you from litigation

Unfair competition: Proactive preemption can save you from litigation

With each job change, the risk that the new hire will bring confidential information or trade secrets with him or her to the new company grows.

CyberMaryland conference returns, hosts job fair for military vets

By

The conference will be anchored by the Maryland Cyber Challenge and Competition, a security job fair, and more.

Hackers only need to get it right once, we need to get it right every time

Hackers only need to get it right once, we need to get it right every time

Hackers only need to find one weak point to steal valuable information. On the flip side, security pros need to account for every possible scenario.

Successful strategies for continuous response

Successful strategies for continuous response

While it isn't realistic for organizations to expect that it will never happen to them, a rapid, professional and continuous response can limit their scope and reputational impact.

Black Hat talk on Tor weaknesses canceled

By

Black Hat organizers say legal counsel for the Software Engineering Institute and Carnegie Mellon University nixed the session.

EFF intros wireless router software to boost industry standard

EFF intros wireless router software to boost industry standard

By

This weekend, the digital rights group released a "hacker alpha" version of its Open Wireless Router software.

Microsoft wavers on Canadian spam fears

By

Microsoft has reconsidered a move to cease security emails in Canada, following the introduction of an anti-spam law north of the border.

Underinvestment, poor communication plague Canadian cybersecurity

By

Canadian cybersecurity is languishing due to poor communication and disappointing security investments, according to research from the Ponemon Institute.

Oracle: Java on Windows XP will still get security updates

By

Oracle, the maker of the popular Java plug-in, recently confirmed the details.

When it comes to cyber attacks, predictions are pointless but preparation is key

When it comes to cyber attacks, predictions are pointless but preparation is key

Rather than predicting the next lightning strike it is far better to pay attention to the areas we already know are vulnerable.

Protecting what matters

Protecting what matters

Whether it is a database of customer information or valuable intellectual property, an organization's "crown jewels" need to be protected with the most robust security possible.

After DNS customer backlash, Microsoft returns seized domains to No-IP

By

Microsoft has handed domain control back to No-IP after millions of customers were reportedly impacted by its legal action.

Report: DDoS attacks down, gov't increasingly a target

Report: DDoS attacks down, gov't increasingly a target

By

In its quarterly "State of the Internet" report Akamai observed 283 DDoS attacks in the first quarter of 2014.

Rethinking cyber security in an interconnected world

Rethinking cyber security in an interconnected world

A combination of fundamental and new strategies provides a winning formula against would-be attackers.

The evolving role of the CSO

By

In this video, SC Magazine's Danielle Walker interviews Trey Ford, global security strategist at Rapid7, to discuss the rapidly changing role of the CSO.

Black Hat organizers announce Dan Geer as keynote

By

In August, Dan Geer, CISO at In-Q-Tel, will hit the hacking conference's keynote stage in Las Vegas.

New initiative offers threat collaboration for oil, gas industry

By

A new initiative aimed at information sharing among the oil and gas industries in relation to cyber threats has been launched Thursday.

Report: Organizations recognize security risks, slow to take action

Report: Organizations recognize security risks, slow to take action

By

A recent study has found a significant gap between perceived risk and the actual safeguarding of sensitive data.

The compromise of things: Security considerations in a connected world

The compromise of things: Security considerations in a connected world

We must prepare for the security considerations when it comes to the looming technological phenomenon that is the Internet of Things.

Would the game change if organizations prepared for an attack?

Would the game change if organizations prepared for an attack?

When you take into account the constantly evolving threat landscape, there's always room for improvement in the cyber security realm.

IBM CISO: Company boards need big picture threat data

IBM CISO: Company boards need big picture threat data

By

IBM's global CISO advised security pros on engaging boards of directors about organizational threats.

Girls Who Code kicks off summer immersion program

By

On Monday, the nonprofit launched its 2014 Summer Immersion Program, impacting 380 high school girls across the country.

"Human error" contributes to nearly all cyber incidents, study finds

"Human error" contributes to nearly all cyber incidents, study finds

By

A new IBM report reveals that organizations experienced more than 91 million "security events" last year.

New cyber risk guide aimed at corporate directors

By

The NACD, AIG and the ISA have issued a set of best practices to help boards understand and handle cyber security issues.

The Microsoft dilemma: Why security isn't enough

The Microsoft dilemma: Why security isn't enough

In the world of information security, naturally, security is of paramount importance, but control is king.

Canadian auditors failing on cyber security

By

Audit committees in Canada are falling behind the rest of the world by not spending enough time assessing cyber security, warned a KPMG report this month.

The systems management imperative: Achieving more effective perimeter security from the inside out

The systems management imperative: Achieving more effective perimeter security from the inside out

To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.

Medical device researcher Jay Radcliffe joins Rapid7

By

Radcliffe was named one of 2013's top security thinkers by SC Magazine.

TrueCrypt audit to continue, despite software's shaky future

By

Last week, the developers of the encryption tool announced that the they would no longer maintain the software.

Sign up to our newsletters

POLL