InfoSec Staffing

InfoSec Staffing news, information, and how-to advice

Kimberly Clark names new CISO

Timothy Youngblood joins Kimberly Clark as their Chief Information Security Officer.

Our bias for breach prevention is causing blind spots

We have an inherent bias toward prevention, even as we freely admit we can’t prevent a breach. That leads to the neglect of detection, response, and the role of culture in building a successful security program. Explore how and why to


Target CIO resigns as company moves to recover from breach

Beth Jacob, Target's Chief Information Officer during the largest retail breach on record, has resigned from her post in the wake of the incident.

Executives to blame for bad risk decisions? Hardly. The real problem is our failure to communicate

The apparent inability of executives to understand and act on security information is generally a failure of security professionals to effectively communicate value. Here are some ways to fix it.

CDW Integrates with Google Apps for Cloud Collaboration

Through a partnership with Google and Esna Technologies, CDW has rolled out native access to the CDW Cloud Collaboration suite within Google Apps.

IT innovation challenging security pros' knowledge, resources

Upper management pushing for rollout of new technology without fully understanding security risks

Does your title match your authority?

Security may be getting more respect at the executive table, but how much does a C-level security title really mean when it comes to having the power to secure an organization?

Survey says more attention being paid to data privacy, but still a ways to go

PwC released results of 2013 data privacy survey late last year, which pointed to increased communication, but also continuing struggles to meet compliance and regulation requirements

Punish careless employees to reduce security breaches, vendor says

Holding employees accountable for carelessly falling prey to social engineering schemes could lead to tighter security

Redefining Endpoint Security With Isolation Technology: An innovative, new security architecture

Find out how to secure your enterprise and empower your users to click on anything, anywhere without the fear of being compromised.

How do you plan for a 15 minute discussion about social media security?

How would you handle a request to talk about social media security - perhaps in your company - if you had about a month to prepare and 15 minutes to speak as part of a panel? What follows is an overview of my process, my preparation...

Senior managers fumble security much more often than rank and file

Busy schedules and belief that they are above the rules lead to slip ups, says study

Noted speaker, Mikko Hypponen, cancels RSA talk in protest

In a letter to Joseph Tucci, and Art Coviello, F-Secure's Mikko Hypponen says he is canceling his talk at the 2014 RSA Conference, due to the company's deal with the NSA.

winxp desktop

No More XP: CSOs Need to Engage Now

Migrating off of Windows XP has become an issue that has jumped to the top of the CIO priority lists all over the world. Is your enterprise ready? Are you engaged with the plan?

Predictive Defense and Real-Time Insight: The Next Step in Advanced Threat Protection

Download this complimentary report, featuring the Gartner Research "Designing an Adaptive Security Architecture for Protection From Advanced Attacks", and learn why organizations can't rely solely on traditional blocking

The top 8 security threats of 2013

In a year full of them, experts share what they believed to be the biggest security threats of this past year

5 fixes to help CSOs stay ahead of risks

Enterprises are having a challenging time getting ahead of their security risks, but experts say a handful of long-term improvements could help do the trick

Want better passwords? Follow the lead of 1Password and make it easier for people

As the spate of password breaches continues, the challenge is how quickly news of each new attack fades into the background as noise. It makes it even harder to connect with people and convince them to take action. Shift to providing...

Why BYOD actually increases security, based on the recent findings shared by Sophos

Businesses naturally manage risk. All risks, including finding and increasing revenue. Part of the process is the search for and adoption of new solutions and technologies that reduce the cost and increase the capability of driving...

Healthcare Information Management: A New Urgency

With the challenges of an evolving regulatory environment and the information overload problem with management practices, many organizations have now reached an inflection point.

Study: Business leaders lacking confidence in IT

Reduction in investment in availability, security, backup, and recovery hindering IT's ability to deal with disruptive events

Senior executives blamed for a majority of undisclosed security incidents

Malware analysts find that many of the undisclosed issues could have been easily avoided

A conversation with Dave Cole on successfully incorporating security into the product development lifecycle

Dave Cole has successfully addressed and navigated the challenge of incorporating security into product development for the bulk of his career. He recently shared some of his insights on successfully bridging the gap between product...

Let others define the security challenge to solve more problems

When Karen found the spreadsheet, she reviewed the information. What she found was clearly related to the trading floor. She then made an assumption that if the spreadsheet looked important, it needed to be protected. She saw a...

Load More