OPINIONS

PCI 3.0: The good, the changes and why it's not ugly

PCI 3.0: The good, the changes and why it's not ugly

The primary challenge to secure payment card data is that too many involved see the PCI DSS as a panacea for every risk in the marketplace.

The Internet of Things (IoT) will fail if security has no context

The Internet of Things (IoT) will fail if security has no context

The Internet of Things requires a new way of thinking and acting, one that will protect a business and help it grow.

Failing the security test: Target wasn't the first failing grade, or the last

Failing the security test: Target wasn't the first failing grade, or the last

It's easy to get hung up on discussions around chip-and-pin, malware and network segmentation, and in the process lose sight of the broader trends that underlie many breaches.

Four commonly overlooked security gaps

Four commonly overlooked security gaps

If organizations are looking to raise their security profile, they should certainly examine these commonly overlooked areas.

Combating cyber risk in the supply chain

Combating cyber risk in the supply chain

Everyone involved with vendor management should now develop a common, collaborative security strategy.

A silver lining in the JPMorgan breach?

A silver lining in the JPMorgan breach?

This incident gives the industry hope that proactive measures can stop an attacker before a breach drives catastrophic results.

Does an Executive Order make payments more secure in the U.S.?

Does an Executive Order make payments more secure in the U.S.?

This year has been so bad for merchant data breaches that the president felt the need to ensure that the government would offer itself as a more safe and secure place to do business with.

Me and my job: Marisa Fagan, director of crowd operations, Bugcrowd

Me and my job: Marisa Fagan, director of crowd operations, Bugcrowd

This month, we get to know Marisa Faga, Bugcrowd's director of crowd operations.

Will cyber threaten mobile?

Will cyber threaten mobile?

As mobile devices are further integrated into networks, organizations will have a critical need to implement end-to-end security solutions.

Selling Snowden-style access: Inside threat

Selling Snowden-style access: Inside threat

Edward Snowden has the same broad access and privileges that many employees in similar positions have at almost every business.

Sign up to our newsletters

TOP COMMENTS