OPINIONS

Three reasons native mobile apps need extra security love

Three reasons native mobile apps need extra security love

Aside from the many benefits native apps provide, enterprises face challenges they need to deal with to make sure they aren't exposed to the new security risks native apps introduce.

Think you should just be worried about fines? Think again. And think like an attacker.

Think you should just be worried about fines? Think again. And think like an attacker.

When it comes to healthcare security, if you think compliance is the only thing you need to worry about, think again.

Why government cybersecurity measures should take cues from industry-driven rules

Why government cybersecurity measures should take cues from industry-driven rules

On the whole, the recent steps taken by government are thoughtful and meaningful - and the attention to cybersecurity is overdue. But will they be enough?

Time to eliminate the value of SSNs

Time to eliminate the value of SSNs

If we can't stop breaches, then let's remove the incentive for hacking by devaluing the data, especially Social Security Numbers.

4 DevOps survival tips for security specialists

4 DevOps survival tips for security specialists

How can security pros adapt and automate their own processes to support DevOps without the business being eaten alive from non-compliance, hacks and exposures?

Me and my job: Kristi Carrier, quality auditor, Nuspire Networks

Me and my job: Kristi Carrier, quality auditor, Nuspire Networks

In this month's issue we get to know more about Kristi Carrier and her role as the Quality Auditor at Nuspire Networks.

Are mobile apps risky business?

Are mobile apps risky business?

The increasing prevalence of mobile applications is exposing new security holes for businesses.

Information privacy and Big Data

Information privacy and Big Data

Enterprises are finding new ways to solve problems and extract value from data.

The security model is broken

The security model is broken

Every enterprise is susceptible to a breach, unless something changes, says Craig Shumard, principal of Shumard and Associates.

Breach response: Are you prepared?

Breach response: Are you prepared?

Streamline your incident plan with clear IT security operational definitions and develop a detailed inventory of every asset within your network, says ViJay Viswanathan, CISO, HD Supply.

Sign up to our newsletters

TOP COMMENTS