Security Leadership

Security Leadership news, information, and how-to advice

Are you prepared to address the security impact of aging coders on key systems?

Recognizing the impact of aging coders on the security of key systems is not yet a priority. Which is precisely why it’s important. Here are some considerations.

Changing times in the CSO suite

The role of the CSO is continuing to evolve and becoming more distant from being a technologist as the IT C-suite becomes one with the business, according to EMC CSO Dave Martin.


Security must evolve to be ‘all about the data’

Experts on panel discussion sponsored by Dell agree that the current security model is obsolete, and that to face the expanding and evolving threat landscape will require embedding data itself with smart security protection

Dutch spy agencies can receive NSA data, court rules

Because raw data is shared in bulk, less stringent privacy safeguards apply, the court said

Tor Project working to fix weakness that can unmask users

The anonymity software's developers believe they've identified the problem

Black Hat presentation on TOR suddenly cancelled

The presentation revolved around de-anonymizing users of the privacy tool

security awareness

6 steps to win executive support for security awareness programs

Obtaining C-Level support for security awareness programs can be tough, so Ira Winkler and Samantha Manke share a handful of tips for appealing to the executives in your organization

knowledge is power 149148084

Misconceptions about targeted attacks

Trend Micro's Spencer Hsieh published a blog recently that caught my attention. It's focused on misconceptions surrounding targeted attacks. It's an interesting read, which I thought was worth sharing on Salted Hash.

stack of documents

Study examines the problems with metadata and file sharing

A study by Workshare, a company focused on secure file sharing applications, says that 68 percent of the 800 professionals surveyed failed to remove metadata before sharing documents. Due to this oversight, potentially sensitive...

US court says warrant for access to all content of email account is justified

The government was granted a warrant to obtain emails and other information from a Gmail account

cybergrowth

Cybercrime: still only a tiny percentage of GDP, but it’s growing

Cybercrime claims only a tiny slice of America's economy - less than 1%. But experts warn that it is growing fast. Worse, is that too many companies aren't taking even basic steps to reverse, or even slow the trend.

Net neutrality a key battleground in growing fight over encryption, activists say

Both carriers and government now have an interest in how users keep their online lives private

Do security seals on websites matter?

Does a security seal on a website demonstrate a commitment to security?

binary hard drive

CryptoWall blamed for possible data breach at Benjamin F. Edwards & Co.

Warning of a potential data breach, Benjamin F. Edwards & Co. (BFE) says that CryptoWall, a variant of CryptoLocker, infected an employee's computer on May 27.

Small business security failings create enterprise supply chain risk, says Kaspersky Lab

SMBs have ‘head in the sand' over threats

Survey: Corporate security thwarted by dialog failure between IT dept. and management

Ponemon survey of 4,881 IT and security practitioners also shows many want total security-product overhaul to counter advanced persistent threats.

Chaos Computer Club bolsters NSA spying complaint with Tor snooping evidence

The Chaos Computer Club wants new evidence to prompt an investigation into mass surveillance of German citizens

security awareness

No money, no problem: Building a security awareness program on a shoestring budget

Implementing a security awareness program seems rather straightforward, until you actually start to implement one - factoring in things like resources and the people (users) to be trained. At that point, it can seem complicated,...

Kenneth van Wyk: We can't just blame users

Yes, users sometimes do stupid things. Some always will. But developers need to do more to save users from themselves.

Leading life sciences security

Life Science companies are under enormous pressure to counter the significant threats to their business and our health. Their success in necessary well beyond their bottom line, but has consequences reaching into our health and our...

Load More