Print Issue: March 03, 2014
Breaches at Target and other major retailers as well as Coca-Cola, Android mobile devices infected with malware, and other news.
Recent breaches have highlighted the need for talented technologists with the ability to assess vulnerabilities long before they are under attack.
Cloud computing is becoming a reality that will need to be addressed by every security department.
Has mobile malware changed through time as dramatically as the headlines might imply?
We’ve all been breached, but there are steps we can take to evolve the system, says security strategist Dan Srebnick.
It’s time to admit that the bad guys can always make a first move, says Damballa’s Manos Antonakakis.
John Gibson discusses the challenges and rewards of his security role at tTech Ltd. as the senior IT security officer.
Organizations are struggling with how to more quickly account for and guard against zero-day vulnerabilities, reports Karen Epper Hoffman.
Small and midsized businesses are not exempt from cyber attack, reports James Hale.
A spate of recent DDoS attacks forced banks to change their threat response – and that’s a good thing, reports Teri Robinson.
Next post in Features