Malware on the move: Mobile malware
Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.
Like virtually all online threats, malware is increasingly finding a ripe new territory on the mobile platform, reports Karen Epper Hoffman.
Even when you’ve got a breach or an insider gone bad, there are still ways to limit the damage and protect data, reports Alan Earls.
Security certifications can land you a better job, but companies are also looking for people who can communicate and manage projects, reports Steve Zurier.
Despite ongoing attacks against major corporations, not much is changing at the executive level, says Illena Armstrong, VP, editiorial, SC Magazine.
Experts debate whether the financial industry has a leg up in terms of their cybersecurity strategy when compared to other industries.
Hackers are finding new attack vectors to exploit and it is becoming harder for us “security professionals” to defend our organizations, says Zouhair Guelzim, CISO, L’Oréal Americas.
Social engineering will always be a looming threat for organizations, and spear phishing plays a significant part.
In new budgets, both at organizations and the government, one thing’s for sure: Cybersecurity spending continues to trend upward.
Our First Look this month generated one of those “ah ha!” moments in us when we saw what it was and how it worked.
Welcome to our annual rundown of vulnerability management tools. This is an interesting category as much for its stability as its evolution.