Print Issue: January 02, 2013
Rodney Dangerfield couldn’t get any respect, and neither can CISOs, who still struggle for recognition within the C-suite. But ignore them at your own risk, says Deven Bhatt, CISO for WEX.
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.
Cloud computing still is trying to overcome the trust and reliability issues that has made it a questionable proposition for many organizations.
For those organizations at risk to a nation-state attack, preparation should come with the expectation of compromise, as well as knowledge that the damage can be mitigated.
DesktopDirect is a simple – though not at all simplistic – RDP gateway.
As we start 2013 off, I’m pretty sure that information security leaders everywhere are glad to hear all those predictions about their budgets getting a boost this year (and that the Mayans were wrong).
The notion of authentication is one that is so familiar to most of us that it hardly bears discussing. Or does it?
If no one can guarantee an organization is hack-proof, then perhaps it’s time for a more practical approach – cyber liability insurance.
Vormetric’s new CEO, Apple’s newest security researcher, and more of the latest security company news.
Stretched across websites, carefully placed beside content and at times popping out of nowhere to steal one’s attention, we can run from online advertisements, but we certainly can’t hide.
Next post in Editorial