Industry Insight

Cisco supply chain CSO talks cradle to grave security

By

Edna Conway, Cisco's global supply chain CSO, spoke at SC Congress NY with a panel of experts.

Online fraud detection: Three recommendations

Online fraud detection: Three recommendations

Fraud managers have the thorny task of safeguarding their organizations and its customers against fraudsters. New best practices in online fraud detection (OFD) have emerged that advocate a "five layer model."

Cisco announces winners of Security Grand Challenge

By

Cisco unveiled the winners of three Security Grand Challenges and announced a fourth challenge, aimed at women.

Technology alone isn't going to secure IoT connected devices

Technology alone isn't going to secure IoT connected devices

It's clear that vulnerabilities continue to exist, despite our best efforts to combat them. In fact, we have addressed many of the same problems before.

Former RSA CISO named president and COO of White Ops

By

Eddie Schwartz has been appointed the new president of the New York City-based online fraud company.

Security, tech firm coalition fights Hikit actors, other advanced groups

Security, tech firm coalition fights Hikit actors, other advanced groups

By

The coalition began as an effort to stop the spread of the Hikit trojan, previously known for targeting U.S. defense contractors.

DDoS is the new spam...and it's everyone's problem now

DDoS is the new spam...and it's everyone's problem now

As new solutions emerge, it's critical for organizations to protect themselves by being informed, aware, and acting whenever possible. Those that don't take action are playing a very dangerous game.

Transparency reports useful, but more info needed on 'digital searches'

Transparency reports useful, but more info needed on 'digital searches'

By

Transparency reports are common these days, but the information they provide can still be difficult to read and understand.

Securing the autonomous vehicle

Securing the autonomous vehicle

We are now in the fast lane towards a driverless future. Will we have to brake for hackers?

Report examines cloud-based security market drivers, concerns

Report examines cloud-based security market drivers, concerns

By

NSS Labs highlighted the growth of security-as-a-service (SaaS) vendors, and issues facing the market.

Symantec splits into two companies

By

As rumors swirled, Symantec announced that it would become two companies, one focused on security and the other on information management.

White House head of cybersecurity suggests selfies as password alternative

By

Rather than staying true to the password as the primary security method, Michael Daniel, White House cybersecurity coordinator, suggested biometrics or even selfies as an alternative.

CISO: same title, new opportunities

CISO: same title, new opportunities

Despite big responsibilities compounded by a string of headline-grabbing data breaches, the skies are looking brighter for CISOs.

Frequency analysis: an efficient, effective approach to network defense

Cybersecurity teams spend the majority of their time trying to figure out exactly what is happening on their networks. They would be better served trying to focus on how often things happen on their network.

ISACA announces entry-level cybersecurity certificate

By

A new cybersecurity certificate has been launched by global IT association ISACA that's intended for those looking to break into the field.

Millenials improve security habits, more interested in cyber careers, still need guidance

Millenials improve security habits, more interested in cyber careers, still need guidance

By

Raytheon's second annual survey on the online and security behavior of Millennials shows improvement but still a long way to go.

Board-level planning: Tangible metrics can persuade

Board-level planning: Tangible metrics can persuade

Security leaders must create visible value for the organization, says Unisys's Francis Ofungwu.

Becoming a "security thinker"

Becoming a "security thinker"

Active security thinking ensures that we don't simply perpetuate security folklore.

The great communicator: Government policy

The great communicator: Government policy

By

It's all about what you say and how you say it, says DHS's Phyllis Schneck. Teri Robinson reports.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Bridging the talent gap in health care

Bridging the talent gap in health care

By

Cybercriminals are primarily after patient data as it really gets them more money.

Company news: New execs at Malwarebytes and an acquisition by VMware

By

The latest mergers and acquisitions and personnel moves, including Malwarebytes, Abacus Group, VMware, Bay Dynamics, vArmour, Secunia, Norse and more.

Me and my job: Michael Canavan, Kaspersky Lab North America

Me and my job: Michael Canavan, Kaspersky Lab North America

We catch up and learn a bit more about Michael Canavan, senior director, systems engineering, Kaspersky Lab North America.

Skills in demand: Communications and messaging experts

Skills in demand: Communications and messaging experts

The demand for infosec-focused communications and messaging pros is growing.

Falling off the 'Wagon of Things'

Falling off the 'Wagon of Things'

The Internet of Things promises so much. And so the question arises, how are we going to keep all this 'stuff' safe and secure?

Know your traffic: The case for egress monitoring and filtering

Know your traffic: The case for egress monitoring and filtering

Our networks are our field; no one knows our network better than us, the people who maintain it. We need to use that to our advantage.

NIST taps MITRE to support National Cybersecurity Center of Excellence

By

The contract includes initial tasks totaling $29 million, the U.S. Commerce Department's NIST said.

Breach shaming and the need for a new model to discuss data breaches

Breach shaming and the need for a new model to discuss data breaches

The breach shaming trend impedes forward progress in preventing such incidents in the future and leaves consumers worrying without educating them.

BadUSB: The unusual suspect

BadUSB: The unusual suspect

When security research like the most recent one regarding BadUSB announced by SR Labs appeared, security experts and vendors usually take two sides.

Report: Intrustion prevention systems made a comeback in 2013

Report: Intrustion prevention systems made a comeback in 2013

By

A new report indicates that intrusion prevention systems grew 4.2 percent in 2013, with growth predicted to continue.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US