Employ cyber hunters who can find malicious activity within the network, says Kristin Lovejoy.
A federal data breach notification law would provide much needed uniformity, says David R. Singh.
Attack vectors multiply as more devices connect to enterprise environments, says IANS's Chris Poulin.
Effective detection is comprised of several parts, says Cyphort's Nick Bilogorsiy.
With the use of social media, HR and IT must work together to ensure that both employees and company data stay secure.
Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.
Many organizations still hesitate to move to the cloud. Why?
The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².
Containment solutions can help stop the spread of malware, says Bufferzone CEO Israel Levy.
Companies can benefit by using a complex security approach, says A1QA's Aleksey Abramovich.
Invest in the talented women on your team, says Joyce Brocaglia.
This is an exciting - albeit overwhelming - time for security pros, says Daniel Polly.
Vendors bundling software with open source libraries caught the IT community unprepared, says Secunia's Kasper Lindgaard.
A single solution won't stop data theft, says ADP's Roland Cloutier.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
An ill-informed worker is a weak link that leaves a giant gap in your defenses, says SOHO Solutions VP Scott Aurnou.
Every enterprise is susceptible to a breach, unless something changes, says Craig Shumard, principal of Shumard and Associates.
Cooperation is required to advance the profession, says Towerwall's Candy Alexander.
With parameters, new tech can help your business, says McAfee's Jonathan Fox and Tyson Macaulay.
It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.
Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.
Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.
Chip technology can prevent criminals from producing counterfeit credit cards.
Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.
Recent breaches prompt a new emphasis on education and corporate culture, says Allegis Capital's Bob Ackerman.
Let's agree on a definition of the term "security" and move forward from there, says AT&T's Chris Mark.
The malicious insider or outsider does not stop on the first attempt, says Verdasys' Peter Tyrrell.
Don't hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.
We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.
Cloud providers must be evaluated before moving operations, says the DTCC's Mark Clancy.
Robust enterprise security requires more than checking compliance boxes, says Diebold CSO Adam Williams.
Managing privacy is moving toward collaboration, communication and education, says Ernst & Young's Sagi Leizerov.
To defend against evolving threats, prepare and maintain vigilance, says DTCC's Parthiv Shah.
The rule may help leaders better understand the impact of cyber risks, says PwC's David Burg and Laurie Schive.
Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.
Prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini.
Security pros should be less secretive, says New York City CISO Dan Srebnick.
If we want the best minds, we can no longer look to only half the population, says Karen Purcell.
2013 may be the year that U.S. companies strike back at their cyber adversaries, says Taia Global's Jeffrey Carr.
Though standards lack, sharing threat data is vital, says EMC's Christopher Harrington.
We must resolve issues around data sovereignty, says Capgemini's Joe Coyle.
Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.
Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.
Expect a sea change in digital security over the coming years, says Richard Bejtlich.
Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.
The operating environment itself must be altered, says Verdasys' Dan Geer.
Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.
...nevertheless, companies need to do a better job of protecting IP, says Adam Segal.
Data protection laws can be more effective if simpler, says JAS Global Advisors' Jeff Schmidt.
SC Magazine Articles
- Yahoo breach; State-sponsored actors suspected, at least 500 million accounts affected
- Cybercriminals already able to hack ATM biometric readers
- Education sector bullied by ransomware and can barely defend itself, report
- IoT assault, connected devices increasingly used for DDoS attacks
- Cisco warns of exploitation of new flaws linked to Shadow Brokers exploits
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- X-ray and MRI machines among devices used as springboards for data breach attacks
- Hacker purportedly selling over 650,000 stolen medical records on dark web marketplace
- Wi-Fi warning! Study finds U.S. unaware of public Wi-fi risks
- RIG EK rigged to steal tricks from Neutrino in fight to fill Angler's void
- SWIFT adds additional protective measures for members to ensure cybersecurity compliance
- 185M incidents bypassed perimeter defenses - report
- Pagers found leaking patient health information
- OVH suffers massive 1.1Tbps DDoS attack