OPINIONS

Who is responsible for software safety? Nobody is no longer an option

Who is responsible for software safety? Nobody is no longer an option

It is now up to banks to self-regulate themselves or continue to deal with the pressing questions of concerned officials like Benjamin Lawsky.

Building a proactive versus solutions-based security plan

Building a proactive versus solutions-based security plan

2014 taught us that organizations cannot rest on their laurels. Security team needs to be in a state of hypervigilance. This is precisely why developing and implementing a proactive security plan will be a critical component of 2015 IT priorities.

The problem with Big Data

The problem with Big Data

Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.

The 10 POS malware families this holiday season

The 10 POS malware families this holiday season

This holiday shopping season, many retailers have two goals in mind - make record-breaking sales and don't get breached.

Securing the enterprise with the five W's of access

Securing the enterprise with the five W's of access

Burden of proof should grow heavier as request for access grows more sensitive.

Why compliance matters

Why compliance matters

Part of my role requires me to ask questions that an auditor might. This is especially true when it comes to compliance, why it matters, and how it makes a difference.

The cybersecurity skills gap

The cybersecurity skills gap

Cooperation is required to advance the profession, says Towerwall's Candy Alexander.

The proliferation of mandates

The proliferation of mandates

The reality of ubiquitous reliance on ICT has given rise to the criticality of cyber security, says Cisco CSO Edna Conway.

Missing the big picture in the Sony hack

Missing the big picture in the Sony hack

Should we rush out signatures for this latest version of malware, or should we take a step back and figure out how to focus our technology and security operations around identifying attackers before they wreak such havoc?

Expanding security zones, a historical example

Expanding security zones, a historical example

Network security today has similar defensive problems to those posed to American Colonial population centers. Here's why...

Sign up to our newsletters

TOP COMMENTS