Security Leadership

Security Leadership news, information, and how-to advice

five posts

7 warning signs of could-be rogue employees

7 warning signs an employee has gone rogue

Trust and IT go hand in hand. Here are the red flags to watch for before you get burned

police inpectors

Who ‘owns’ an investigation into a security breach?

When things go wrong, as they inevitably will in any organization, the way to resolve those problems starts with an effective investigation. But an advisory council says too often those investigations are plagued with confusion and...

ssl secure browser security lock

Is it possible to determine if your Internet connection has been hijacked?

This post will describe the difference between HTTP and HTTPS connections, as well as what it means to you as you're browsing the Web. After that, we're going to talk about things that can impact HTTPS (e.g. Man-in-the-Middle...

bad news

Why our bad mental diet leads us to question if security even matters

Faced with relentless waves of negative information about the state of security today, it’s easy to get discouraged and question if our efforts even matter

google logo

Google scraps annual Pwnium bug-hunting contest

Google is scrapping Pwnium, its annual bug hunting event, and folding it into an existing year-round program in part to reduce security risks. But Tim Willis of the Chrome Security Team wrote in a blog post that the annual event isn't...


Security offers a marketing advantage for ADP

ADP's award-winning payroll vendor management system helps the company serve more international markets and clients than ever before and is, in fact, doing it so well that its managers are routinely asked to sit in on sales meetings...

If you could go back in time...

Turning back the clockImage by ShutterstockEvery week brings news of breaches, cybercrime and state-sponsored hacks, each more shocking than the last.Unfortunately, it's not practical to rip up the whole Internet and start over again...

power fingerprint

How ‘Power fingerprint’ could improve security for ICS/SCADA systems

Every digital device or system has a power fingerprint. A new company says monitoring that fingerprint in ICS/SCADA systems can detect intrusions or malfunctions in real time. But some experts say that while it will improve security,...


The key to a successful security project

A CISO shares his thoughts on what it takes to make a security project successful.

credit health

Credit monitoring as an employee benefit

There are many forms of identity theft and credit fraud out there and, just as with every other low-risk criminal enterprise enabled by the interconnectedness of our world, instances of these crimes are growing. In the U.S. credit...

heatlhcare doctor

After the Anthem breach: How we can help secure health data

The Anthem breach may have seemed a baffling or inexcusable security lapse. But once you understand what’s going on in healthcare security and technology right now, you can see why this was inevitable and how we can help prevent such...

Lenovo Y50 gaming laptop

Lenovo says Superfish problems are theoretical, but that simply isn't the case

On Thursday, the world woke to the news that commercial-grade Lenovo PCs were being shipped from the factory with adware pre-installed on the system. Designed to provide a visual shopping experience, the software is insecure and...

Lenovo Y40 Gaming PC

FAQ: How to find and remove Superfish from your Lenovo laptop

Lenovo has shipped consumer PCs with software designed to offer a visual shopping experience, but in reality it's adware that breaks HTTPS online – leaving customers vulnerable to attack and information theft. Here’s how to determine...


It’s time for a National Cybersecurity Safety Board (NCSB)

With regards to information security, the Sony breach of 2014 shows that the time has arrived to create a National Cybersecurity Safety Board (NCSB).

lenovo n20p chromebook 3qtr

Lenovo shipping laptops with pre-installed adware that kills HTTPS

Lenovo is in hot water after it was revealed on Wednesday that the company is shipping consumer laptops with Superfish (Adware) pre-installed. Security experts are alarmed, as the software performs Man-in-the-Middle attacks that...


Millennials becoming known as Generation Leaky

Millennials, who will soon become the largest population group in the workforce, bring high expectations for convenience and collaboration from technology, but little apparent concern about security. That's a major problem, experts...

00 title

8 areas where CSOs and CIOs will converge in 2015

With enterprise innovations and a changing workforce, not to mention more sophisticated physical and cybersecurity threats, we’re at a time now where CSOs and CIOs have no choice but to play nice in the sandbox.


Phishing for clickers

Gummy worms, t-shirts and executive buy-in all helped Viewpost design a CSO50-award winning program to reduce phishing attacks.

Load More