For the incoming federal CISO: Focus on the human side of cybersecurity

For the incoming federal CISO: Focus on the human side of cybersecurity

The new federal CISO should be a champion for the role of information security not just in the public sector, but across all walks of American life, from business to school to home.

Phishing: What makes people click?

Phishing: What makes people click?

Dr Jules Pagna Disso explains why phishing remains one of the most successful forms of attack, and why staff education is key to tackling the problem.

Understanding advanced evasion techniques

Three quick tips for preventing ransomware

Diversity means better results

Diversity means better results

My gender doesn't matter, but my skills and actions do, says Caroline Wong, security initiative director, Cigital.

The rise of cyber hunting

The rise of cyber hunting

Employ cyber hunters who can find malicious activity within the network, says Kristin Lovejoy.

Advocating for gender diversity together

Advocating for gender diversity together

Accomplished, intelligent and experienced women are filling executive leadership roles, says Illena Armstrong.

Demystifying CASB

Demystifying CASB

Cloud access security brokers are becoming a key initiative for many CISOs, says Latha Maripuri, SVP and global CISO, News Corp.

As the imagination allows

As the imagination allows

You can map your own route to a cybersecurity career, says HPE's Jewel Timpe.

Pervasive security in a connected world

Pervasive security in a connected world

In an increasingly connected world, we will need the right security, in the right place, at the right time, says Cisco CSO Edna Conway.

UK Cyber-security after Brexit: May not be as bad as it first appears

It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security every chance of staying in very good shape says Ilia Kolochenko.

Preventing sophisticated attacks with next generation firewalls

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Like pilots, CISOs need a cockpit to manage threats, vulnerabilities, risk

Chief Information Security Officers (CISO) today no longer sit in the IT and security corner doing "techie" things.

Me and my job: Satyam Tyagi, CTO, Certes Networks

Me and my job: Satyam Tyagi, CTO, Certes Networks

Me and my job: Satyam Tyagi CTO, Certes Networks

Skills in demand: June 2016

Skills in demand: June 2016

Skills in demand: June 2016

Debate: Vendor VPNs: Good Idea?

Debate: Vendor VPNs: Good Idea?

Exploit kits upping the ante for security defense

Exploit kits upping the ante for security defense

For thieves, exploit kits are little efficiency machines, says Dell Security's Dmitriy Ayrapetov.

Securing IoT devices

Securing IoT devices

IoT devices can be a game changer, but unfortunately many are designed for convenience and functionality without security in mind.

Compliance at risk

Compliance at risk

A federal data breach notification law would provide much needed uniformity, says David R. Singh.

Embracing the business of security

Taking a methodical approach to security, risk and governance planning must be part of the foundation of every organization these days, says Illena Armstrong, VP of editorial, SC Magazine.

New world of IoT, new risks

New world of IoT, new risks

The IoT isn't just about thermostats and internet-connected refrigerators, says Bruce Forman CISO, UMass Memorial Medical Center.

Improving network operational efficiency

Latest Flash Exploit being used to create drive-by ransomware attack

Latest Flash Exploit being used to create drive-by ransomware attack

A criminal enterprise well known for using malware-laced fake display ads is ramping up efforts by infecting dozens of popular websites using a recently patched Flash Player exploit to deliver the Angler EK in a drive-by style attack.

Don't dump your perimeter security

Why Internet of Things matters

Why Internet of Things matters

Attack vectors multiply as more devices connect to enterprise environments, says IANS's Chris Poulin.

Skills in demand, May 2016

Skills in demand, May 2016

As more and more organizations encourage consumers and clients to visit their websites to conduct business or shop the application security engineer is highly sought after.

Me and my job: Joel D. Rader, solution architect, Radiant Logic

Me and my job: Joel D. Rader, solution architect, Radiant Logic

Me and my job: Joel D. Rader, solution architect, Radiant Logic

Debate: Forensics staff will be replaced by robots.

Debate: Forensics staff will be replaced by robots.

Government surveillance from Caesar to Nixon

Government surveillance from Caesar to Nixon

Government surveillance is, however, not new, says Patrick O'Kane, barrister and compliance counsel.

Speak the board's language or get fired

Speak the board's language or get fired

A communication gap exists today between CISOs and the board of directors, says Feris Rifai, CEO, Bay Dynamics.

Hot or not, this industry is still growing up

Even with all the hoopla, there are CISOs still having challenges, vendors that aren't meeting needs, and companies still giving security short shrift, says Illena Armstrong, VP editorial, SC Magazine.

Who owns information security risk in your organization?

Who owns information security risk in your organization?

Security is a business risk that needs to be understood and owned by your business leaders, says Jeff Brown, former technology risk officer, AIG.

Where are all the security pros?

Where are all the security pros?

IT security is finally becoming a priority - not only for IT professionals in every industry, but also for the C-suite, says Marcin Kleczynski, CEO, Malwarebytes.

Cyber Warfare - Who are you going to call?

Cyber Warfare - Who are you going to call?

If your organization is connected to the Internet, you are very likely engaged in cyber warfare whether you like it or not.

Me and my job: Karthik Rangarajan security engineer, Addepar

Me and my job: Karthik Rangarajan security engineer, Addepar

Me and my job: Karthik Rangarajan security engineer, Addepar

Debate» To automate or not? You must realize the limitations of your incident response technology.

Debate» To automate or not? You must realize the limitations of your incident response technology.

Apple vs. FBI: Too much to ask

Apple vs. FBI: Too much to ask

If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .

Apple vs. FBI: Comply!

Apple vs. FBI: Comply!

In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.

The new age of protection

The new age of protection

Effective detection is comprised of several parts, says Cyphort's Nick Bilogorsiy.

We're off our game

Talk of attack prevention is antiquated, says Illena Armstrong, VP editorial, SC Magazine.

Stop blaming the victim

Stop blaming the victim

I am recommending we develop a paradigm shift in the way that we view data breaches, says Zachery S. Mitcham, CISO, University of North Carolina Wilmington.

Cross-border transfers: A vexing problem

Cross-border transfers: A vexing problem

It's anyone's guess what the outcome of the upcoming Brexit vote will be, but it could create significant turmoil, says IBM's Jon Wilkinson.

Me and my job: Mushegh Hakhinian chief security architect, Intralinks

Me and my job: Mushegh Hakhinian chief security architect, Intralinks

Me and my job: Mushegh Hakhinian chief security architect, Intralinks

Threat of the Month: Executive staff/middle management

Threat of the Month: Executive staff/middle management

Debate: Closing the security gap is a people problem.

Debate: Closing the security gap is a people problem.

Quantifying risk

Quantifying risk

Having a security awareness program in place can have an innumerable ROI.

Beyond the patch

Beyond the patch

Why retrospective data analysis is critical after a security breach.

Social media threats

Social media threats

With the use of social media, HR and IT must work together to ensure that both employees and company data stay secure.

Health care horror stories...and cures

The health care industry must step up when it comes to addressing its steady stream of IT security risks, says Illena Armstrong, VP, editorial, SC Magazine.

Keeping the lights on!

Keeping the lights on!

Recently, there has been an increased intensity in scrutiny of the world's electric grids, says Edna Conway, CSO, global value chain, Cisco Systems.

Me and my job: Gina Chapman

Me and my job: Gina Chapman

Gina Chapman, senior director of security operations, Center for Internet Security

Mutiny on the bug bounty

Researcher Wesley Wineberg said he's been censured due to his participation in the Facebook bug bounty program.

Threat of the month: February 2016

Threat of the month: Man-in-the-middle attack

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.

Right-sized surety training

Right-sized surety training

Security awareness training aims not only to impart information, but also to change behavior.

Securing open source

Securing open source

Open source code might be presumed mature, but could rely on technology developed a decade earlier.

Mitigating ransomware

Mitigating ransomware

Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.

Resolving to keep assurance commitments in 2016

New year commitments by the lone individual also could be adopted by the larger organization.

Establishing a pragmatic security program

Establishing a pragmatic security program

Many companies are establishing formal security programs for the first time or are seeking to optimize existing programs to improve the level of maturity.

Intelligent threat intelligence

Intelligent threat intelligence

A combination of machines and humans is key to risk management, Carole Fennelly says.

Built in: From myth to reality

Built in: From myth to reality

A combination of machines and humans is key to risk management, says Cisco CSO Edna Conway.

Cloud myths debunked

Cloud myths debunked

Many organizations still hesitate to move to the cloud. Why?

Let's just call it "The era of IT security"

This year has been marked by the almost daily occurrence of some information security-related incident or another.

What IT security can learn from the credit fraud paradigm

What IT security can learn from the credit fraud paradigm

We've all received a call at one point or another from the fraud protection departments of our credit card providers, telling us they've detected some suspicious activity on our accounts and would like to verify a few recent charges.

The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Thwart email phishing

Thwart email phishing

While there is a regular discussion of how to prevent successful phishing attempts, one of the most successful approaches is ongoing employee training, says Colin McKinty, VP Cyber Security Strategy at BAE Systems Applied Intelligence.

Skills in demand, November 2015

Skills in demand, November 2015

The demand for security DevOps engineers is growing.

Me and My Job: Rick Collette

Me and My Job: Rick Collette

Me and My Job: Rick Collette, devops team lead, Evident.io

Consultants: Pitfalls to avoid

Consultants: Pitfalls to avoid

many enterprises are turning to security consultants to perform assessments of their systems, says Michael R. Overly attorney, Foley & Lardner.

Demystifying an assurance fallacy

Demystifying an assurance fallacy

The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².

Pushing past shock and yawn

As mainstream users become more expectant of massive compromises of personal information, cybercriminals show no sign of giving up on using current tactics and finding new ones to steal data whatever their endgames may be.

Addicted to mobile technology?

Addicted to mobile technology?

Lena Smart, VP / CIO of the New York Power Authority, offers a few tips for freeing yourself from mobile addiction.

Lessons from the Experian hack

Lessons from the Experian hack

Experian breach is more than just another hack as cross referencing of data sets opens up even more scope for ciminal activity says Max Vetter

Is North Korea climbing to the top of the cyber-attack tree?

Is North Korea climbing to the top of the cyber-attack tree?

Pete Shoard asks how powerful are less developed countries such as North Korea when it comes to cyber-threats, and can it be regarded as a major player in cyber-warfare anyway for the impact it has achieved?

Security Threats are on the Rise: Is Your SAP Data Really Protected?

Security Threats are on the Rise: Is Your SAP Data Really Protected?

Instead of hoping for your end-users to make the right decision or your DLP solution to make the right guess, data protection solutions need to be context-aware.

Are SYNful Knock-style router attacks set to become the new normal?

Are SYNful Knock-style router attacks set to become the new normal?

In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.

Skills in demand: Security engineer, identity management

Skills in demand: Security engineer, identity management

Skills in demand: Security engineer, identity management

Me and my job: Surendhar Subramani

Me and my job: Surendhar Subramani

Me and my job: Surendhar Subramani, senior information security consultant, Ernst & Young, India

Debate: What is the edge of IoT security responsibility? Will device-level security testing be enough?

Debate: What is the edge of IoT security responsibility? Will device-level security testing be enough?

U.S. must improve data laws

U.S. must improve data laws

Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?

Canada stands against spam

Canada stands against spam

The impact of Canada's anti-spam legislation for companies big and small.

In the zone: Physical to network

In the zone: Physical to network

Containment solutions can help stop the spread of malware, says Bufferzone CEO Israel Levy.

A disconnected walk in the woods

Our working hours may grow longer, more demanding and more exposed as the Internet of Things (IoT) continues its fast evolution.

Rethinking your IT leadership strategy

Rethinking your IT leadership strategy

Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.

Cloud container assurance

Cloud container assurance

Organizations need a solution that is built for the container pattern, says John Morello.

How to counter the M&A cybersecurity threat: hint, don't use Twitter, email

How to counter the M&A cybersecurity threat: hint, don't use Twitter, email

A leak, a hack, or a simple mistake can blow up any M&A deal carefully crafted over months or even years, says Stephen Dearing.

Me and my job: David F. Katz

Me and my job: David F. Katz

David F. Katz, partner, Nelson Mullins

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

Debate: Device manufacturers take a comprehensive approach to securing consumer products.

The accountability gap

The accountability gap

As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.

"Dead apps"

"Dead apps"

The mobile malware threat is mostly based on hype, not facts.

A complex approach = cost savings

A complex approach = cost savings

Companies can benefit by using a complex security approach, says A1QA's Aleksey Abramovich.

Defining a virtual act of war

Defining a virtual act of war

The questions regarding a more consistent reliance on offensive capabilities are concerning.

Standing before the board

Standing before the board

Public and media focus on data breaches and regulatory fees have dramatically deepened the focus on information security for executive boards.

Viewpoints: Why is there a lack of women in IT security?

Why is there a lack of women in IT security?

Women in IT Security: Progress despite inequities

While we continue to make headway toward embracing a diverse workforce in the IT security field, we're still far from fully realizing this end.

RECENT COMMENTS

Sign up to our newsletters

FOLLOW US