Me and my job: Gina Chapman

Me and my job: Gina Chapman

Gina Chapman, senior director of security operations, Center for Internet Security

Mutiny on the bug bounty

Researcher Wesley Wineberg said he's been censured due to his participation in the Facebook bug bounty program.

Threat of the month: February 2016

Threat of the month: Man-in-the-middle attack

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Right-sized surety training

Right-sized surety training

Security awareness training aims not only to impart information, but also to change behavior.

Securing open source

Securing open source

Open source code might be presumed mature, but could rely on technology developed a decade earlier.

Mitigating ransomware

Mitigating ransomware

Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.

Resolving to keep assurance commitments in 2016

New year commitments by the lone individual also could be adopted by the larger organization.

Establishing a pragmatic security program

Establishing a pragmatic security program

Many companies are establishing formal security programs for the first time or are seeking to optimize existing programs to improve the level of maturity.

Intelligent threat intelligence

Intelligent threat intelligence

A combination of machines and humans is key to risk management, Carole Fennelly says.

Built in: From myth to reality

Built in: From myth to reality

A combination of machines and humans is key to risk management, says Cisco CSO Edna Conway.

Cloud myths debunked

Cloud myths debunked

Many organizations still hesitate to move to the cloud. Why?

Let's just call it "The era of IT security"

This year has been marked by the almost daily occurrence of some information security-related incident or another.

What IT security can learn from the credit fraud paradigm

What IT security can learn from the credit fraud paradigm

We've all received a call at one point or another from the fraud protection departments of our credit card providers, telling us they've detected some suspicious activity on our accounts and would like to verify a few recent charges.

The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Thwart email phishing

Thwart email phishing

While there is a regular discussion of how to prevent successful phishing attempts, one of the most successful approaches is ongoing employee training, says Colin McKinty, VP Cyber Security Strategy at BAE Systems Applied Intelligence.

Skills in demand, November 2015

Skills in demand, November 2015

The demand for security DevOps engineers is growing.

Me and My Job: Rick Collette

Me and My Job: Rick Collette

Me and My Job: Rick Collette, devops team lead, Evident.io

Consultants: Pitfalls to avoid

Consultants: Pitfalls to avoid

many enterprises are turning to security consultants to perform assessments of their systems, says Michael R. Overly attorney, Foley & Lardner.

Demystifying an assurance fallacy

Demystifying an assurance fallacy

The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².

Pushing past shock and yawn

As mainstream users become more expectant of massive compromises of personal information, cybercriminals show no sign of giving up on using current tactics and finding new ones to steal data whatever their endgames may be.

Addicted to mobile technology?

Addicted to mobile technology?

Lena Smart, VP / CIO of the New York Power Authority, offers a few tips for freeing yourself from mobile addiction.

Lessons from the Experian hack

Lessons from the Experian hack

Experian breach is more than just another hack as cross referencing of data sets opens up even more scope for ciminal activity says Max Vetter

Is North Korea climbing to the top of the cyber-attack tree?

Is North Korea climbing to the top of the cyber-attack tree?

Pete Shoard asks how powerful are less developed countries such as North Korea when it comes to cyber-threats, and can it be regarded as a major player in cyber-warfare anyway for the impact it has achieved?

Security Threats are on the Rise: Is Your SAP Data Really Protected?

Security Threats are on the Rise: Is Your SAP Data Really Protected?

Instead of hoping for your end-users to make the right decision or your DLP solution to make the right guess, data protection solutions need to be context-aware.

Are SYNful Knock-style router attacks set to become the new normal?

Are SYNful Knock-style router attacks set to become the new normal?

In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.

Skills in demand: Security engineer, identity management

Skills in demand: Security engineer, identity management

Skills in demand: Security engineer, identity management

Me and my job: Surendhar Subramani

Me and my job: Surendhar Subramani

Me and my job: Surendhar Subramani, senior information security consultant, Ernst & Young, India

Debate: What is the edge of IoT security responsibility? Will device-level security testing be enough?

Debate: What is the edge of IoT security responsibility? Will device-level security testing be enough?

U.S. must improve data laws

U.S. must improve data laws

Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?

Canada stands against spam

Canada stands against spam

The impact of Canada's anti-spam legislation for companies big and small.

In the zone: Physical to network

In the zone: Physical to network

Containment solutions can help stop the spread of malware, says Bufferzone CEO Israel Levy.

A disconnected walk in the woods

Our working hours may grow longer, more demanding and more exposed as the Internet of Things (IoT) continues its fast evolution.

Rethinking your IT leadership strategy

Rethinking your IT leadership strategy

Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.

Cloud container assurance

Cloud container assurance

Organizations need a solution that is built for the container pattern, says John Morello.

How to counter the M&A cybersecurity threat: hint, don't use Twitter, email

How to counter the M&A cybersecurity threat: hint, don't use Twitter, email

A leak, a hack, or a simple mistake can blow up any M&A deal carefully crafted over months or even years, says Stephen Dearing.

Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

"Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

A complex approach = cost savings

A complex approach = cost savings

Companies can benefit by using a complex security approach, says A1QA's Aleksey Abramovich.

Defining a virtual act of war

Defining a virtual act of war

The questions regarding a more consistent reliance on offensive capabilities are concerning.

Standing before the board

Standing before the board

Public and media focus on data breaches and regulatory fees have dramatically deepened the focus on information security for executive boards.

Viewpoints: Why is there a lack of women in IT security?

Why is there a lack of women in IT security?

Women in IT Security: Progress despite inequities

While we continue to make headway toward embracing a diverse workforce in the IT security field, we're still far from fully realizing this end.

10 Reasons You Need to Test, Not Guess

10 Reasons You Need to Test, Not Guess

How you are securing your sensitive information should not be a guessing game

Top of the app charts - Shuabang: automated malware made in China

Shuabang companies in China sell installs and user ratings to app developers to help boost their profile, which is leading to new forms of malware, says Chema Alonso.

Women in IT Security: Ability and opportunity

Women in IT Security: Ability and opportunity

Invest in the talented women on your team, says Joyce Brocaglia.

Skills in demand: Incident response manager

Skills in demand: Incident response manager

The need for experienced incident response professionals is outstripping the available supply of talent.

Me and my job: Mikel Draghici

Me and my job: Mikel Draghici

Mikel Draghici, principal mobile security specialist, Usher

Critic: NSA on a "very ugly path"

After 30-plus years as an official in the National Security Agency (NSA), William Binney has been speaking out about what he sees as the "very ugly path" his former employer, along with the FBI and CIA, are currently following.

Threat of the Month: Cryptolocker

Threat of the Month: Cryptolocker

Debate: The Pentagon's strategy to use cyberwarfare in conflicts with enemies is necessary.

Debate: The Pentagon's strategy to use cyberwarfare in conflicts with enemies is necessary.

Congress promotes sharing

Congress promotes sharing

Congress took significant action in April to address cybersecurity information-sharing efforts.

Hiring in information security

Hiring in information security

You can't hire quality information security talent the same way you hire customer service reps.

Information sharing at work

Information sharing at work

There's been quite a bit of lip service paid to the ages-old concept of information sharing, says Illena Armstrong, VP, editorial, SC Magazine..

Detecting and reducing counterfeit chips

Detecting and reducing counterfeit chips

Cisco Systems CSO Edna Conway calls for action to stop the risks of counterfeit or tainted information.

Debate: Congress should mandate that the payment card industry adopt safer technology.

Debate: Congress should mandate that the payment card industry adopt safer technology.

To thine own self be true

To thine own self be true

Much needs to be done to convince boardrooms of the importance of information security.

IT only guards the front gate

IT only guards the front gate

It's time for a dramatic reimagining of how companies approach security.

Data exfiltration defense

Data exfiltration defense

A single solution won't stop data theft, says ADP's Roland Cloutier.

Trifecta 2.0: Trust, privacy and security

Trifecta 2.0: Trust, privacy and security

Trust directly correlates to our expectations of privacy, says Illena Armstrong, VP, editorial.

Staying safe in cyber land

Staying safe in cyber land

It is important for everybody to stay vigilant when online, says Lena Smart, CIO, New York Power Authority.

Watch out for third-party apps

Watch out for third-party apps

Vendors bundling software with open source libraries caught the IT community unprepared, says Secunia's Kasper Lindgaard.

Why cybersecurity is vital during the vendor selection process

Why cybersecurity is vital during the vendor selection process

You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.

Building on IT security to protect all intellectual property

Building on IT security to protect all intellectual property

To extend the ERM approach to information and IP, companies need to create a comprehensive inventory of sensitive data and intellectual property that are key to their competitiveness.

What CISOs need most: Courage in the face of security nihilism

What CISOs need most: Courage in the face of security nihilism

Today's CISO must play a strategic and forceful role in mandating the transition to a more secure enterprise infrastructure.

Cybersecurity is broken

Cybersecurity is broken

Target. Home Depot. Morgan Stanley. Sony. Anthem. Jennifer Lawrence. You?

Wake up! What are you doing to battle breach fatigue?

Wake up! What are you doing to battle breach fatigue?

IT pros, beware: The phenomenon of "data breach fatigue" isn't just an issue of consumer complacency.

Me and my job: Johannes Ullrich, SANS Technology Institute

Me and my job: Johannes Ullrich, SANS Technology Institute

In this month's "Me and my job" feature, we get to know Johannes Ullrich of the SANS Technology Institute.

Debate: Your money is safe online.

Debate: Your money is safe online.

Given the recent headline-grabbing breaches, in this month's debate information security professionals discuss whether or not money is safe online.

Mobile interfacing with IoT

Mobile interfacing with IoT

The security community is abuzz about the risks of reverse engineering code.

Bad guys are inside

Bad guys are inside

It is an assumption for many enterprises operating today that they may already have been compromised.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

Giving sidelined IT security pros some love

Giving sidelined IT security pros some love

Threats loom heavily on the minds of those charged with keeping critical data safe from bad actors, says Illena Armstrong, VP editorial, SC Magazine.

The failure of the security industry

The failure of the security industry

A CSO with a budget must be in want of a thousand dedicated point solutions, says Alex Stamos, CISO, Yahoo.

Strike back on payment security

Strike back on payment security

Passing the annual compliance assessment is just the start of a vigilant security program, says Stephen Orfei of the PCI SSC.

PCI DSS 3.0 is good, but not good enough

PCI DSS 3.0 is good, but not good enough

With every new data leak end users are looking for ways to better protect themselves and keep their personal financial identity safe from hackers.

The best defense is a good offense: The importance of securing your endpoints

The best defense is a good offense: The importance of securing your endpoints

The saying "better safe than sorry" rings true when it comes to data security.

Shadow data: The monster that isn't just under your bed

Shadow data: The monster that isn't just under your bed

As end users bring their own devices, applications, and even networks into their employer's fray, hallowed IT security concepts like visibility, control and peace of mind are jettisoned out the window.

The power of the subconscious to protect against online fraud

The power of the subconscious to protect against online fraud

Cybercriminals often are specifically looking for credit card numbers that can be reused on other e-commerce sites or sold to the highest bidder on the digital black market.

The car alarm syndrome and the high cost of too many security alerts

The car alarm syndrome and the high cost of too many security alerts

Sophisticated bad guys are likely to assume that high-value targets have deployed the latest security technologies - this has been the case going back over a decade.

Why it's time to replace the tootsie pop approach to network security

Why it's time to replace the tootsie pop approach to network security

How did we arrive at this approach to network security and, more importantly, what's happening today that's causing us to seriously rethink this approach?

The one-two punch of cybercrime: Who's leading the fight?

The one-two punch of cybercrime: Who's leading the fight?

Whose responsibility is it to lead the fight against cybercrime and protect valuable health care data? The answer: it's not just one person.

Why enterprise IT and security teams should talk more

Why enterprise IT and security teams should talk more

The "It won't happen to me" mentality combined with communication gaps between the IT and security teams greatly increases enterprises' risk of being breached.

Developer liability, data proliferation at center of FTC report on IoT

Developer liability, data proliferation at center of FTC report on IoT

The truth is simply that none of us, including the FTC and Ofcom, fully know or understand the extent for which the unintended consequences of IoT will show its ugly head.

This key unlocks the door to a network virtualization wonderland

This key unlocks the door to a network virtualization wonderland

One crucial step will ensure that you do not fall haphazardly down the rabbit hole on your way there.

What we can learn from $1 billion bank-robbing malware

What we can learn from $1 billion bank-robbing malware

If we can learn anything from the Carbanak malware, it is to use stealthy and evasive maneuvers in the security technology and education we deploy within enterprises to fight fire with fire.

IoT security: It's not to late to get it right!

IoT security: It's not to late to get it right!

As much as I applaud the FTC for making security a priority, its recommendations are light years away from where the current IoT security bar is.

Protect people, not machines

Protect people, not machines

Perimeter security has only brought us so far. It's time to embrace a user-centric model instead.

Policy driven development: Bringing DevOps to InfoSec

Policy driven development: Bringing DevOps to InfoSec

In order to show risk is being properly managed, security teams are often regarded as gatekeepers who slow the pace of software development due to what is perceived as their authoritative behavior.

Playing defense in ranks: Cybersecurity reimagined

Playing defense in ranks: Cybersecurity reimagined

Technological innovation is now increasingly consumer led forcing organizations to adopt faster to serve them or it diffuses into the work environment leaving the traditional IT to play catch-up.

Me and my job: Bob West, chief trust officer, CipherCloud

Me and my job: Bob West, chief trust officer, CipherCloud

Here's a closer look at CipherCloud's Chief Trust Officer Bob West.

Debate: The financial industry really is better at cybersecurity than other industries.

Experts debate whether the financial industry has a leg up in terms of their cybersecurity strategy when compared to other industries.

Rethink your cybersecurity strategy

Rethink your cybersecurity strategy

Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.

How far have we come?

How far have we come?

Identity management has evolved rapidly over the past decade, says Jim Robell, president and COO, Eid Passport.

Communicating security concepts

Communicating security concepts

An ill-informed worker is a weak link that leaves a giant gap in your defenses, says SOHO Solutions VP Scott Aurnou.

Sign up to our newsletters

RECENT COMMENTS

FOLLOW US