It's difficult to predict how the global and British economies will react to Brexit in the long run, however UK Cyber-security every chance of staying in very good shape says Ilia Kolochenko.
Chief Information Security Officers (CISO) today no longer sit in the IT and security corner doing "techie" things.
If your organization is connected to the Internet, you are very likely engaged in cyber warfare whether you like it or not.
Me and my job: Karthik Rangarajan security engineer, Addepar
If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O'Leary, VP of Threat Research Center, WhiteHat Security. .
In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.
Effective detection is comprised of several parts, says Cyphort's Nick Bilogorsiy.
Talk of attack prevention is antiquated, says Illena Armstrong, VP editorial, SC Magazine.
It's anyone's guess what the outcome of the upcoming Brexit vote will be, but it could create significant turmoil, says IBM's Jon Wilkinson.
Gina Chapman, senior director of security operations, Center for Internet Security
Threat of the month: Man-in-the-middle attack
Debate: Cybersecurity information sharing allows network defenders to stay ahead of adversaries.
Security awareness training aims not only to impart information, but also to change behavior.
Open source code might be presumed mature, but could rely on technology developed a decade earlier.
Ransomware is a complex threat, but its impact can be lessened, says Thomas Gresham.
Many companies are establishing formal security programs for the first time or are seeking to optimize existing programs to improve the level of maturity.
Many organizations still hesitate to move to the cloud. Why?
This year has been marked by the almost daily occurrence of some information security-related incident or another.
We've all received a call at one point or another from the fraud protection departments of our credit card providers, telling us they've detected some suspicious activity on our accounts and would like to verify a few recent charges.
The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.
The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.
There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.
While there is a regular discussion of how to prevent successful phishing attempts, one of the most successful approaches is ongoing employee training, says Colin McKinty, VP Cyber Security Strategy at BAE Systems Applied Intelligence.
many enterprises are turning to security consultants to perform assessments of their systems, says Michael R. Overly attorney, Foley & Lardner.
The one-throat-to-choke theory is a fallacy, says David Shearer, CEO, (ISC)².
Lena Smart, VP / CIO of the New York Power Authority, offers a few tips for freeing yourself from mobile addiction.
Experian breach is more than just another hack as cross referencing of data sets opens up even more scope for ciminal activity says Max Vetter
Pete Shoard asks how powerful are less developed countries such as North Korea when it comes to cyber-threats, and can it be regarded as a major player in cyber-warfare anyway for the impact it has achieved?
Instead of hoping for your end-users to make the right decision or your DLP solution to make the right guess, data protection solutions need to be context-aware.
In the wake of the SYNful Knock attack on its routers, Cisco should re-engineer its devices to prevent future attacks, says Raimund Genes.
Can U.S. data protection laws protect privacy and preserve tech innovation and intellectual property?
The impact of Canada's anti-spam legislation for companies big and small.
Many organizations are also investing heavily to hire top-notch CISOs to fill the presumed leadership gap in security.
Organizations need a solution that is built for the container pattern, says John Morello.
A leak, a hack, or a simple mistake can blow up any M&A deal carefully crafted over months or even years, says Stephen Dearing.
David F. Katz, partner, Nelson Mullins
Debate: Device manufacturers take a comprehensive approach to securing consumer products.
As mobile and cloud dominate the future of the enterprise, security and accountability are falling through the cracks.
The mobile malware threat is mostly based on hype, not facts.
Companies can benefit by using a complex security approach, says A1QA's Aleksey Abramovich.
Public and media focus on data breaches and regulatory fees have dramatically deepened the focus on information security for executive boards.
How you are securing your sensitive information should not be a guessing game
Mikel Draghici, principal mobile security specialist, Usher
Cisco Systems CSO Edna Conway calls for action to stop the risks of counterfeit or tainted information.
Debate: Congress should mandate that the payment card industry adopt safer technology.
Much needs to be done to convince boardrooms of the importance of information security.
It's time for a dramatic reimagining of how companies approach security.
A single solution won't stop data theft, says ADP's Roland Cloutier.
It is important for everybody to stay vigilant when online, says Lena Smart, CIO, New York Power Authority.
You likely have a list of criteria to check through during the hiring process of a vendor, but if you haven't added cybersecurity standards to that list, you should.
To extend the ERM approach to information and IP, companies need to create a comprehensive inventory of sensitive data and intellectual property that are key to their competitiveness.
Today's CISO must play a strategic and forceful role in mandating the transition to a more secure enterprise infrastructure.
Target. Home Depot. Morgan Stanley. Sony. Anthem. Jennifer Lawrence. You?
IT pros, beware: The phenomenon of "data breach fatigue" isn't just an issue of consumer complacency.
In this month's "Me and my job" feature, we get to know Johannes Ullrich of the SANS Technology Institute.
The security community is abuzz about the risks of reverse engineering code.
It is an assumption for many enterprises operating today that they may already have been compromised.
The rise of IoT will require a completely new approach to network security, says vArmour CEO Timothy Eades.
A CSO with a budget must be in want of a thousand dedicated point solutions, says Alex Stamos, CISO, Yahoo.
Passing the annual compliance assessment is just the start of a vigilant security program, says Stephen Orfei of the PCI SSC.
With every new data leak end users are looking for ways to better protect themselves and keep their personal financial identity safe from hackers.
The saying "better safe than sorry" rings true when it comes to data security.
As end users bring their own devices, applications, and even networks into their employer's fray, hallowed IT security concepts like visibility, control and peace of mind are jettisoned out the window.
Cybercriminals often are specifically looking for credit card numbers that can be reused on other e-commerce sites or sold to the highest bidder on the digital black market.
Sophisticated bad guys are likely to assume that high-value targets have deployed the latest security technologies - this has been the case going back over a decade.
How did we arrive at this approach to network security and, more importantly, what's happening today that's causing us to seriously rethink this approach?
Whose responsibility is it to lead the fight against cybercrime and protect valuable health care data? The answer: it's not just one person.
The "It won't happen to me" mentality combined with communication gaps between the IT and security teams greatly increases enterprises' risk of being breached.
The truth is simply that none of us, including the FTC and Ofcom, fully know or understand the extent for which the unintended consequences of IoT will show its ugly head.
One crucial step will ensure that you do not fall haphazardly down the rabbit hole on your way there.
If we can learn anything from the Carbanak malware, it is to use stealthy and evasive maneuvers in the security technology and education we deploy within enterprises to fight fire with fire.
As much as I applaud the FTC for making security a priority, its recommendations are light years away from where the current IoT security bar is.
Perimeter security has only brought us so far. It's time to embrace a user-centric model instead.
In order to show risk is being properly managed, security teams are often regarded as gatekeepers who slow the pace of software development due to what is perceived as their authoritative behavior.
Technological innovation is now increasingly consumer led forcing organizations to adopt faster to serve them or it diffuses into the work environment leaving the traditional IT to play catch-up.
Here's a closer look at CipherCloud's Chief Trust Officer Bob West.
Even the most sophisticated, well-intentioned perimeter-focused cybersecurity strategy cannot possibly be 100 percent effective, says Oliver Tavakoli, CTO, Vectra.
Identity management has evolved rapidly over the past decade, says Jim Robell, president and COO, Eid Passport.
An ill-informed worker is a weak link that leaves a giant gap in your defenses, says SOHO Solutions VP Scott Aurnou.
Hackers are finding new attack vectors to exploit and it is becoming harder for us "security professionals" to defend our organizations, says Zouhair Guelzim, CISO, L'Oréal Americas.
Aside from the many benefits native apps provide, enterprises face challenges they need to deal with to make sure they aren't exposed to the new security risks native apps introduce.
When it comes to healthcare security, if you think compliance is the only thing you need to worry about, think again.
On the whole, the recent steps taken by government are thoughtful and meaningful - and the attention to cybersecurity is overdue. But will they be enough?
If we can't stop breaches, then let's remove the incentive for hacking by devaluing the data, especially Social Security Numbers.
How can security pros adapt and automate their own processes to support DevOps without the business being eaten alive from non-compliance, hacks and exposures?
In this month's issue we get to know more about Kristi Carrier and her role as the Quality Auditor at Nuspire Networks.
The increasing prevalence of mobile applications is exposing new security holes for businesses.
Enterprises are finding new ways to solve problems and extract value from data.
Every enterprise is susceptible to a breach, unless something changes, says Craig Shumard, principal of Shumard and Associates.
Streamline your incident plan with clear IT security operational definitions and develop a detailed inventory of every asset within your network, says ViJay Viswanathan, CISO, HD Supply.
Psychological acceptability may not sound like a term that'll hold much significance for the future of secure file sharing, but don't sell it short.
Consider the main learning points from this event and count yourself lucky that you can learn at Sony Picture Entertainment's massive expense.
Many states have laws today that require corporations and government agencies to notify consumers in the event of a breach - but it is not enough.
The wolf isn't at your door, it's inside. Ignorance is definitely not bliss. Just ask any of the regulatory agencies.
While most agree that corporate security needs to improve, a question still remains: Even with best practices in place, could the Sony debacle have been prevented?
It is now up to banks to self-regulate themselves or continue to deal with the pressing questions of concerned officials like Benjamin Lawsky.
2014 taught us that organizations cannot rest on their laurels. Security team needs to be in a state of hypervigilance. This is precisely why developing and implementing a proactive security plan will be a critical component of 2015 IT priorities.
Big Data just keeps on getting bigger and bigger. It's almost like Moore's Law. And...it has a domino effect.
This holiday shopping season, many retailers have two goals in mind - make record-breaking sales and don't get breached.
Burden of proof should grow heavier as request for access grows more sensitive.
SC Magazine Articles
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Brexit shakeup: How will the U.K.'s exit from the EU affect the technology sector?
- Dangerous connections: Risky LinkedIn behavior runs rampant, finds survey
- Hard Rock Hotel & Casino Las Vegas hit with POS breach
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Wendy's POS breach 'considerably' bigger than first thought
- No hacking required: Israeli researchers show how to steal data through PC components
- Don't connect your charging cell to a computer or you may get hacked!