Print Issue: January 02, 2013
Debate: Bug bounty programs – offering monetary rewards to researchers – help make companies more secure.
The first “Threat of the Month” for 2013 are virtualized application vulnerabilities.
This month’s news briefs include President Obama issuing guidance for the information security threat posed by insiders, charges in Butterfly botnet case and hack of AT&T website, and other security news.
As threats grow in complexity, many organizations rely on managed security service providers to handle security operations center (SOC) capabilities.
Bring-your-own-device (BYOD) has emerged as an institution in corporate America today – but does the acronym stand for bring your own device or bring your own disaster?
The proposed Cyber Intelligence Sharing and Protection Act (CISPA) is galvanizing government and industry over whether we need federally mandated security legislation and what it should look like.
This issue’s “Me and my job,” features Alex Nehlebaeff, information security manager at Harley-Davidson Financial Services.
If we want the best minds, we can no longer look to only half the population, says Karen Purcell.
A highly regulated debt collector from the U.K. needed to achieve compliance, but it wanted to scrap all of the point solutions on which it traditionally relied.
Next post in Features