Emerging products: Virtual system security
Don’t presume the vShield will protect you. That actually is not the case, says Peter Stephenson.
Don’t presume the vShield will protect you. That actually is not the case, says Peter Stephenson.
How unified is “unified”? Judging by this year’s crop of unified threat managers under review, pretty doggone unified, says Peter Stephenson.
With almost daily advanced attacks, organizations of all sizes must be at the ready, according to respondents to this year’s “Guarding Against a Data Breach” survey. Illena Armstrong reports.
John South joined Heartland Payment Systems when it still was reeling from a devastating breach…and it’s the best career decision he’s ever made. Dan Kaplan reports.
Our program profiling the winners and finalists of the 2013 SC Awards U.S., held Feb. 26 in San Francisco.
Offering up more general guidelines to strengthen the country’s critical infrastructure security – as in the president’s recent executive order – is all well and good, but without any meaningful and enforceable requirements then, really, what’s the point?
This month’s featured debate informs whether the FTC should have the right to penalize companies for poor data security/privacy practices.
Information security executives must work to “engineer” their organizations to be better, faster, cheaper – and more secure, says Rafael Diaz, CISO, state of Illinois.
Java zero-days are the “threat of the month,” a vulnerability that allows remote code execution via browsers.
The European Union is close to implementing an information protection law that will homogenize the responsibility of all of its 27 member states, which could have a ripple effect in the U.S.