Print Issue: April 01, 2016
I am recommending we develop a paradigm shift in the way that we view data breaches, says Zachery S. Mitcham, CISO, University of North Carolina Wilmington.
If Apple complies, the FBI would have the ability to compromise personal security when it wishes, says Ryan O’Leary, VP of Threat Research Center, WhiteHat Security.
In cases where terrorist attacks are carried out state-side, it is vital that intelligence be obtained, says J.J. Thompson, CEO, Rook Security.
Me and my job: Karthik Rangarajan security engineer, Addepar
Effective detection is comprised of several parts, says Cyphort’s Nick Bilogorsiy.
As Washington gets distracted, expect more activity at state legislatures on cybersecurity and privacy, reports Steve Zurier.
The new data transfer mandate presents challenges for enterprises, but global trade depends on its widespread adoption, reports Larry Jaffee.
Enterprises can better defend valuables by making data more difficult to access and less attractive to intruders, reports Robert Abel.
HR firm Pasona N A needed strong and flexible security for file-sharing around the globe, reports Greg Masters.
As Apple and the FBI lace up their gloves for a fight that makes Ali vs. Frazier look like a schoolyard brawl, privacy and security hang in the balance. Teri Robinson reports.
Next post in Features