Last Word

The rise of cyber hunting

The rise of cyber hunting

Employ cyber hunters who can find malicious activity within the network, says Kristin Lovejoy.

Compliance at risk

Compliance at risk

A federal data breach notification law would provide much needed uniformity, says David R. Singh.

Why Internet of Things matters

Why Internet of Things matters

Attack vectors multiply as more devices connect to enterprise environments, says IANS's Chris Poulin.

The new age of protection

The new age of protection

Effective detection is comprised of several parts, says Cyphort's Nick Bilogorsiy.

Social media threats

Social media threats

With the use of social media, HR and IT must work together to ensure that both employees and company data stay secure.

Mitigating ransomware

Mitigating ransomware

Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.

Cloud myths debunked

Cloud myths debunked

Many organizations still hesitate to move to the cloud. Why?

Demystifying an assurance fallacy

Demystifying an assurance fallacy

The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².

In the zone: Physical to network

In the zone: Physical to network

Containment solutions can help stop the spread of malware, says Bufferzone CEO Israel Levy.

A complex approach = cost savings

A complex approach = cost savings

Companies can benefit by using a complex security approach, says A1QA's Aleksey Abramovich.

Women in IT Security: Ability and opportunity

Women in IT Security: Ability and opportunity

Invest in the talented women on your team, says Joyce Brocaglia.

Bring intuition to threat intelligence

Bring intuition to threat intelligence

This is an exciting - albeit overwhelming - time for security pros, says Daniel Polly.

Watch out for third-party apps

Watch out for third-party apps

Vendors bundling software with open source libraries caught the IT community unprepared, says Secunia's Kasper Lindgaard.

Data exfiltration defense

Data exfiltration defense

A single solution won't stop data theft, says ADP's Roland Cloutier.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

Communicating security concepts

Communicating security concepts

An ill-informed worker is a weak link that leaves a giant gap in your defenses, says SOHO Solutions VP Scott Aurnou.

The security model is broken

The security model is broken

Every enterprise is susceptible to a breach, unless something changes, says Craig Shumard, principal of Shumard and Associates.

The cybersecurity skills gap

The cybersecurity skills gap

Cooperation is required to advance the profession, says Towerwall's Candy Alexander.

Privacy and the Internet of Things

Privacy and the Internet of Things

With parameters, new tech can help your business, says McAfee's Jonathan Fox and Tyson Macaulay.

Embracing BYOD...with safeguards

Embracing BYOD...with safeguards

It's possible to safely manage the security risks posed by BYOD, says Anders Lofgren at Acronis Access.

Cloud in an information world

Cloud in an information world

Nation-states are flexing their muscles in the cyber realm, says Avatier's Ryan Ward.

Backing diversity lowers the bar?

Backing diversity lowers the bar?

Many groups have striven to cultivate a more welcoming workplace, says Alison Gianotto.

New tech can better protect

New tech can better protect

Chip technology can prevent criminals from producing counterfeit credit cards.

Target is not alone: Risk indicators

Target is not alone: Risk indicators

Exec buy-in and new tech can help fight cyber threats, says BitSight's Stephen Boyer.

Changing the business culture

Changing the business culture

Recent breaches prompt a new emphasis on education and corporate culture, says Allegis Capital's Bob Ackerman.

The need and the challenge

The need and the challenge

Let's agree on a definition of the term "security" and move forward from there, says AT&T's Chris Mark.

Data protection in the dark

Data protection in the dark

The malicious insider or outsider does not stop on the first attempt, says Verdasys' Peter Tyrrell.

Eliminate mobile app threats

Eliminate mobile app threats

Don't hang your hat on enterprise app store security, says Jack Walsh at ICSA Labs.

The coming Internet of Things

The coming Internet of Things

We don't need to make the same mistakes of the first generation of PCs and servers, says the SANS Institute's John Pescatore.

One cloud does not fit all

One cloud does not fit all

Cloud providers must be evaluated before moving operations, says the DTCC's Mark Clancy.

Cover those blind spots: Establishing protocols that go beyond compliance

Cover those blind spots: Establishing protocols that go beyond compliance

Robust enterprise security requires more than checking compliance boxes, says Diebold CSO Adam Williams.

Thinking strategically about privacy

Thinking strategically about privacy

Managing privacy is moving toward collaboration, communication and education, says Ernst & Young's Sagi Leizerov.

My job is like a carnival game

My job is like a carnival game

To defend against evolving threats, prepare and maintain vigilance, says DTCC's Parthiv Shah.

App developers and privacy practices: Preach what you practice

App developers and privacy practices: Preach what you practice

Now is the time to prepare and post a privacy policy in a conspicuous place, says Stephen Wu.

Executive order can provide boost

Executive order can provide boost

The rule may help leaders better understand the impact of cyber risks, says PwC's David Burg and Laurie Schive.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

Before you take the plunge...

Before you take the plunge...

Prior to a job switch, ask questions to learn if the company you are considering is in good shape, says former Yahoo CISO Justin Somaini.

Sharing is caring: Take advantage of ISAC

Sharing is caring: Take advantage of ISAC

Security pros should be less secretive, says New York City CISO Dan Srebnick.

Nurturing females for STEM posts

Nurturing females for STEM posts

If we want the best minds, we can no longer look to only half the population, says Karen Purcell.

Cyber laws may need tweaking

Cyber laws may need tweaking

2013 may be the year that U.S. companies strike back at their cyber adversaries, says Taia Global's Jeffrey Carr.

Take to the offense with intel

Take to the offense with intel

Though standards lack, sharing threat data is vital, says EMC's Christopher Harrington.

A public cloud conundrum

A public cloud conundrum

We must resolve issues around data sovereignty, says Capgemini's Joe Coyle.

Flame is lame? Not so much.

Flame is lame? Not so much.

Flame's cryptofunctionality silenced all the haters, says F-Secure's Mikko Hyppönen.

New partnerships required

New partnerships required

Only through collaboration can government and the private sector thwart cyber attacks, says Raymond Choo.

SEC rules: A serious development

SEC rules: A serious development

Expect a sea change in digital security over the coming years, says Richard Bejtlich.

Big Data requires new skills

Big Data requires new skills

Today's firms must identify people who have knowledge from disparate areas, says Tracey Wilen-Daugenti.

Mitigating the next WikiLeaks: Insider threats

Mitigating the next WikiLeaks: Insider threats

The operating environment itself must be altered, says Verdasys' Dan Geer.

David can be Goliath

David can be Goliath

Be patient and give staffers a real chance to show their stuff, says Michael Potters, CEO of the Glenmont Group.

Chinese hacking may slow, but...

Chinese hacking may slow, but...

...nevertheless, companies need to do a better job of protecting IP, says Adam Segal.

State breach rules need revamp

State breach rules need revamp

Data protection laws can be more effective if simpler, says JAS Global Advisors' Jeff Schmidt.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US