OPINIONS

Spotting the "black swans" of security

Spotting the "black swans" of security

How can it be that firms can feel confident in their security technology investments and their people, yet ultimately still believe that they remain at great risk?

Me and my job: Blake Frantz, Center for Internet Security

Me and my job: Blake Frantz, Center for Internet Security

A brief Q&A with Blake Frantz, director of benchmark development, security benchmarks division, Center for Internet Security (CIS).

BlackBerry back in the game

BlackBerry back in the game

Thanks to BYOD, gone are the days of one single mobile device manufacturer or model to support, says Dimension Data Americas' Darryl Wilson.

Decoding the cloud

Decoding the cloud

Unfortunately, data security and regulatory compliance requirements do not evaporate in the public cloud, says Vormetric's Ashvin Kamaraju.

Cyber war, this is not

Cyber war, this is not

Espionage and fraud in cyber is not an armed conflict, says SystemExpert's Jonathan Gossels.

You are an APT target

You are an APT target

Cyber espionage is at an all-time high, and businesses across the United States are being targeted and breached, says Phillip Ferraro, CISO, DRS Integrated Defense Systems and Services.

A new perspective: Compromised computing

A new perspective: Compromised computing

Lets just stop preventing what seems to be unavoidable and figure out how to enable our users to operate securely on a completely compromised device.

The five-step privilege management checklist for financial organizations

The five-step privilege management checklist for financial organizations

Finance companies should adopt an approach of least privilege, which takes into account security and productivity by granting users only the rights necessary to carry out their jobs.

Worry more about the cubicle dweller and less about the Chinese hacker

Worry more about the cubicle dweller and less about the Chinese hacker

While intellectual property theft at the hands of regular employees may not yield the provacative headlines as a Chinese military unit spreading APTs from an office in Shanghai, the former scenario is the more likely one.

IT security: Luxury or commodity in these uncertain times?

IT security: Luxury or commodity in these uncertain times?

Security professionals must toe the delicate line of assessing and responding to legitimate risk and being mindful of an organization's needs. Working in their favor is belief that protecting sensitive data is a fundamental component of any business operation.

Sign up to our newsletters