OPINIONS

When it comes to cyber attacks, predictions are pointless but preparation is key

When it comes to cyber attacks, predictions are pointless but preparation is key

Rather than predicting the next lightning strike it is far better to pay attention to the areas we already know are vulnerable.

Protecting what matters

Protecting what matters

Whether it is a database of customer information or valuable intellectual property, an organization's "crown jewels" need to be protected with the most robust security possible.

Buying something illegal? Bitcoin is not the currency for you.

Buying something illegal? Bitcoin is not the currency for you.

While it's considered a form of anonymous currency, Bitcoin isn't as private as you may think.

P.F. Chang's incident calls for updating payments tech

P.F. Chang's incident calls for updating payments tech

Is it time to go back to cash? Or are there other forms of digital payment that are more secure?

Converting your vendors into your vendor partners

Converting your vendors into your vendor partners

With all of the money invested in security solutions, companies are getting breached at increasingly higher rates. It's time that organizations got the most out of their security vendors.

The compromise of things: Security considerations in a connected world

The compromise of things: Security considerations in a connected world

We must prepare for the security considerations when it comes to the looming technological phenomenon that is the Internet of Things.

Winning at the World Cup: A zonal defensive strategy

Winning at the World Cup: A zonal defensive strategy

As we in the loss prevention industry are always looking for a flag indicating there is a potential for fraud, this one looks like it is as good as any for us to display our vigilance.

Cyber security tasks that could have saved eBay and Target

Cyber security tasks that could have saved eBay and Target

There are three major foundational areas of security, that if focused on, could go a long way in preventing a security breach.

The systems management imperative: Achieving more effective perimeter security from the inside out

The systems management imperative: Achieving more effective perimeter security from the inside out

To fend off cyber attacks, organizations must approach security from all touchpoints, including inventory and asset management, patch management and configuration enforcement.

Me and my job: Col. (Retired) Barry Hensley, Dell SecureWorks

Me and my job: Col. (Retired) Barry Hensley, Dell SecureWorks

It was while working with an elite group of cyber forces in the military that Col. (Retired) Barry Hensley realized the severity of security issues facing this nation.

Sign up to our newsletters