The battle between the iOS and Android platforms continues, but with Apple having the edge on security, and Google with innovation, both are at the top of the mobile totem pole.
A session on spear phishing dissected a slew of attacks used against organizations.
CISOs shared ways IT security professionals can attain the corporate support they need to implement evolving technologies into their security programs.
Researchers at AlienVault are tracking the moves of a highly skilled espionage group, likely nation-state backed and operating out of China, that has hit two U.S. manufacturers of solar panels.
IT management needs to make executives believers before they start implementing their security strategies, according to a longtime security adviser.
Software makers Mozilla and Microsoft have worked DNT functionality into their browsers to protect online privacy, but Google and Facebook want people to remember that their services exist for free thanks to online advertising.
With the rise of state-sponsored espionage and advanced persistent threats, security pros must divert their attention from deploying perimeter-focused security toward raising the cost for attackers once they're already inside.
FBI CISO Patrick Reidy and insider threat analyst Kate Randal spoke on behavioral-based indicators to determine insider threats within the workplace.
Panel members believe a new White House strategy is a good first step to limiting foreign-led corporate cyber espionage, although don't expect change to come quickly.
Entrusting sensitive data to third-parties is a part of doing business, but that doesn't mean organizations should be blindsided by breaches.