Security Industry

Security Industry news, information, and how-to advice

employees technology planning data [Computerworld, January-February 2017 - HR IT]

owasp

Latest OWASP Top 10 looks at APIs, web apps

The new release of the OWASP Top 10 list is out from the Open Web Application Security Project, and while most of it remains the same there are a couple of new additions, focusing on protections for web applications and APIs

iot security ts

Michael Raggo joins 802 Secure as chief security officer

Mobile and Internet of things security expert Mike Raggo will play a key role in product development.

20151028 verizon logo innovation center 100624637 orig

Cyberespionage, ransomware big gainers in new Verizon breach report

Verizon released its tenth annual breach report this morning, and cyberespionage and ransomware were the big gainers in 2016. Cyberspionage accounted for 21 percent of cases analyzed, up from 13 percent last year, and was the most...

security as service 2

Security-as-a-service model gains traction

A new report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs.

post-it with the word

IT mistakes that could cost an organization millions

Here are some scenarios for N00bs to safeguard against costly mistakes for them and their company.

owasp

Contrast Security responds to OWASP Top 10 controversy

Contrast Security has addressed the recent backlash over section A7 of the OWASP Top 10 list for 2017. The company issued a statement on the matter after industry professionals suggested the A7 addition was an example of a vendor...

Volkswagen Sedric concept
video

Sedric is Volkswagen's first autonomous car

Sedric is all-electric, fully autonomous, and operated by a voice-controlled AI agent.

cian 002
video

How to minimize the risks of phishing scams

Employees are often the weakest link in your company's security chain. But with a little knowledge and foresight you can mitigate the risks. In this video, CIO.com senior writer Sharon Florentine explains the anatomy of a phishing...

Lisa Wiswell, GRIMM

"Hack the Pentagon" creator joins GRIMM as principal for security consulting

Lisa Wiswell brings a strong background in security and defense, as well as credibility with the hacker community.

ibm watson

IBM’s security business up 10 percent, powered by Watson

CSO checked in with Marc van Zadelhoff, general manager at IBM Security - one of IBM’s four strategic areas (cloud, analytics, and mobile being the other three) - for a deeper dive into its security initiatives.

office freelancer computer business

Humans are (still) the weakest cybersecurity link

Companies are regularly compromised by social engineering schemes, such as phishing and ransomware. Here’s what they can do prevent attacks and, if that’s too late, mitigate the damage.

professional development 9

Information security professionalism requires both credentialing and codes of professional practice

It's time for information security practitioners to be recognized as professionals. But that will require self-discipline. Independent validation of skills and the promulgation of strong and enforceable codes of professional practice...

behavior facial expressions emotions

You can steal my identity, but not my behavior

The compromise and misuse of identity is at the core of modern threats and data breaches. This has been documented for years and continues to escalate. As a result, we are rapidly approaching the end of life for password-based...

EZGripper
video

These grippers are giving bots a helping hand

Sake Robotics is creating the "hands" that will help robots pick things up and put them down.

mobileye collision avoidance

Security M&A: Intel parks in the collision avoidance space for $15 billion

Intel acquires mobileye, Apple and Cisco cybersecurity acquisitions

2017 nccdc champions maryland

National cyber competition reveals top security talent

University of Maryland, Baltimore County takes ranks first place in 2017 National Collegiate Cyber Defense Championship. Find out how they did it.

Schneider Electric microgrid
video

Schneider Electric's microgrid

Rising costs and an aging infrastructure are pushing companies like Schneider Electric to consider energy microgrids to keep the lights on, save money and reduce greenhouse gases.

Berkeley space rover
video

These shape shifting bots could help NASA explore planets

The robots are made from a number of rods and cables allowing them to easily adapt to moving through challenging terrains and making it much easier for them to be dropped onto the surface of planets than current rovers.

Load More