Print Issue: June 01, 2016
IoT devices can be a game changer, but unfortunately many are designed for convenience and functionality without security in mind.
Me and my job: Satyam Tyagi CTO, Certes Networks
A federal data breach notification law would provide much needed uniformity, says David R. Singh.
Successfully defending against socially engineered phishing campaigns means addressing both technological and human vulnerabilities. Doug Olenick reports.
When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Repeated exposure of private data is giving rise to a new class of companies promising to clean up the mess – and they don’t come cheap. Lee Sustar reports.
These groups possess the skills that can make cybersecurity a rewarding career, says Fortinet’s Stephan Tallent.
CISOs say the Apple-FBI case confirms the need for strong encryption and IT security programs. Steve Zurier reports.
The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.
Taking a methodical approach to security, risk and governance planning must be part of the foundation of every organization these days, says Illena Armstrong, VP of editorial, SC Magazine.
Next post in Editorial