CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
July 7, 2015 Data Leak Could Let Almost Anyone Make ZeusVM Malware Variant 2 min read - Source code for the builder and control panel of the ZeusVM malware has been leaked online, creating powerful tools for would-be cybercriminals.
Endpoint July 7, 2015 Winning the Three-Legged Race Toward Endpoint Protection 2 min read - When it comes to endpoint protection, most IT security and operations teams function a lot like the pairs in a chaotic three-legged race.
CISO July 2, 2015 Teaching Millennials About Privacy and Risk Communications: Part III of an Interview With Kelley Misata 3 min read - Kelley Misata talks more about the security landscape, privacy and risk communications in the third and final part of this interview series.
July 1, 2015 Google Dials In on Citywide Wi-Fi With Old Phone Booths — But Is Security on the Line? 2 min read - Google is dialing in on free citywide Wi-Fi for New York City using old telephone booths, but are they missing the call of critical security concerns?
Data Protection June 29, 2015 FUD or Fact: The Role of News Media in Security 3 min read - A session at the InfoSec Europe conference focused on how the news media covers cybersecurity-related stories and what you can do to change the narrative.
Intelligence & Analytics June 29, 2015 Creating a Cybersecurity Governance Framework: The Necessity of Time 3 min read - The complex work enterprises operate in today comes with many threats. To protect against these risks, organizations need cybersecurity governance.
June 26, 2015 Researchers Develop Hacking Gear Small Enough to Fit Inside a Pita Sandwich 2 min read - You can pack a lot into the average pita — including enough high-tech equipment to eavesdrop and steal data from nearby laptops, researchers have shown.
CISO June 25, 2015 Reframing What We Think We Know About Privacy and Risk: Part II of an Interview With Kelley Misata 3 min read - In the second installment of her interview, Kelley Misata talks about how reframing known cybersecurity concepts can shed new light on important issues.
Endpoint June 23, 2015 Don’t Overlook This Key Element in Securing the Internet of Things 2 min read - You absolutely must think long-term when it comes to the Internet of Things (IoT) because these systems aren't going anywhere anytime soon.