OPINIONS

Me and my job: Johannes Ullrich, SANS Technology Institute

Me and my job: Johannes Ullrich, SANS Technology Institute

In this month's "Me and my job" feature, we get to know Johannes Ullrich of the SANS Technology Institute.

Mobile interfacing with IoT

Mobile interfacing with IoT

The security community is abuzz about the risks of reverse engineering code.

Bad guys are inside

Bad guys are inside

It is an assumption for many enterprises operating today that they may already have been compromised.

Avoid a network stampede

Avoid a network stampede

The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.

The failure of the security industry

The failure of the security industry

A CSO with a budget must be in want of a thousand dedicated point solutions, says Alex Stamos, CISO, Yahoo.

Strike back on payment security

Strike back on payment security

Passing the annual compliance assessment is just the start of a vigilant security program, says Stephen Orfei of the PCI SSC.

PCI DSS 3.0 is good, but not good enough

PCI DSS 3.0 is good, but not good enough

With every new data leak end users are looking for ways to better protect themselves and keep their personal financial identity safe from hackers.

The best defense is a good offense: The importance of securing your endpoints

The best defense is a good offense: The importance of securing your endpoints

The saying "better safe than sorry" rings true when it comes to data security.

Shadow data: The monster that isn't just under your bed

Shadow data: The monster that isn't just under your bed

As end users bring their own devices, applications, and even networks into their employer's fray, hallowed IT security concepts like visibility, control and peace of mind are jettisoned out the window.

The power of the subconscious to protect against online fraud

The power of the subconscious to protect against online fraud

Cybercriminals often are specifically looking for credit card numbers that can be reused on other e-commerce sites or sold to the highest bidder on the digital black market.

Sign up to our newsletters

TOP COMMENTS