Print Issue: June 01, 2016
A federal data breach notification law would provide much needed uniformity, says David R. Singh.
Successfully defending against socially engineered phishing campaigns means addressing both technological and human vulnerabilities. Doug Olenick reports.
When chief executives flout security rules, the losses can be higher than usual. What should organizations do to help their leaders stay on track with cybersecurity? Karen Epper Hoffman reports.
Repeated exposure of private data is giving rise to a new class of companies promising to clean up the mess – and they don’t come cheap. Lee Sustar reports.
These groups possess the skills that can make cybersecurity a rewarding career, says Fortinet’s Stephan Tallent.
CISOs say the Apple-FBI case confirms the need for strong encryption and IT security programs. Steve Zurier reports.
The MIAX Options Exchange needed more than a way to appease regulators, it also required security assurance. Greg Masters reports.
Taking a methodical approach to security, risk and governance planning must be part of the foundation of every organization these days, says Illena Armstrong, VP of editorial, SC Magazine.
Debate: Vendor VPNs: Good Idea?
The IoT isn’t just about thermostats and internet-connected refrigerators, says Bruce Forman CISO, UMass Memorial Medical Center.
Next post in Features