SC Media >
January 02, 2013
The first “Threat of the Month” for 2013 are virtualized application vulnerabilities.
This month’s news briefs include President Obama issuing guidance for the information security threat posed by insiders, charges in Butterfly botnet case and hack of AT&T website, and other security news.
As threats grow in complexity, many organizations rely on managed security service providers to handle security operations center (SOC) capabilities.
Bring-your-own-device (BYOD) has emerged as an institution in corporate America today – but does the acronym stand for bring your own device or bring your own disaster?
The proposed Cyber Intelligence Sharing and Protection Act (CISPA) is galvanizing government and industry over whether we need federally mandated security legislation and what it should look like.
This issue’s “Me and my job,” features Alex Nehlebaeff, information security manager at Harley-Davidson Financial Services.
If we want the best minds, we can no longer look to only half the population, says Karen Purcell.
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.
Rodney Dangerfield couldn’t get any respect, and neither can CISOs, who still struggle for recognition within the C-suite. But ignore them at your own risk, says Deven Bhatt, CISO for WEX.
Compliance brings with it the stigma of cost, complexity and confusion, but viewing it from a risk point-of-view may help make it more tolerable.
Next post in Features