Information Security

Information Security news, information, and how-to advice

Tattered US flag
11 support boardroom

cisco logo sign

Cisco poised to become a cybersecurity force

Cisco's cybersecurity strategy focuses on product integration, an open platform, and simplifying operations for its customers. But it must do more to capture the attention of information security professionals.

orange monitors with lock icon network security cyber threat

GDPR: Where we were…and where we’re going

It’s clear that conventional methods to data security aren’t working anymore, so it’s time to step away from breach prevention and focus on a “secure breach” approach.

cia

Josh Schulte: CIA insider gone south or repugnant criminal?

Josh Schulte, believed to have been the source of the leaked the "Vault 7" Wikileaks trove of CIA tools, has been charged with a heinous crime concerning illegal images.

6 password

Ready for more secure authentication? Try these password alternatives and enhancements

Password-only authentication is dead. Combine passwords with multifactor authentication, social login, biometrics, or risk-based authentication to better protect users and your reputation.

six big projects that went open source 1

Rethinking security

6 foundational steps to make your enterprise security program effective.

medical x ray imaging hands

X-ray your SaaS apps to reveal hidden security vulnerabilities

Best practices to understand security evaluations what is happening "under the hood" of cloud/SaaS applications.

multiple-exposure image - a businessman, a team at a laptop, and data connections against a skyline

Third-party risk: it’s the second hop you should fear

Third-party risk is a persistent fear for CISOs and risk compliance officers especially, with GDPR potentially piercing corporate non-disclosure agreements. Loss of sensitive data from a third party is often managed using protective...

data/statistics being analyzed via laptop

The missing act for user and entity behavior analytics

What’s the real definition of winning? Is it when cyber criminals get inside or when they move sensitive data out? According to Symantec’s SVP of Information Protection, Nico Popp, it’s the latter, making data a vital Indicator of...

Define your organization's culture

Instilling a security-driven culture, from Chicken Little to the Hot Stove Syndrome

It’s 2018, so there’s practically a new breach, vulnerability or some other security-related emergency in the news daily. Given the stakes and risks, you’d think that driving a culture of security and fraud awareness would be...

risk assessment gauge

The enterprise-wide appeal of Business Risk Intelligence

Use cases demonstrate the enterprise-wide appeal of Business Risk Intelligence (BRI).

NetworkSecurity

IT, OT and IoT: existential technology lifecycle management

If you give companies a way to make more money by making it clear that we only buy products that have been tested, approved and include security maintenance plans, those companies will rise to the occasion and work hard to get your...

us eu flag

The GDPR initiative and how it affects US government and industry

Don't make the mistake of thinking the GDPR regulation only affects our friends and neighbors overseas. There may be real implications here at home.

abstract blockchain representation

4 reasons blockchain could improve data security

Learn why security experts should be looking at blockchain.

trophy gold silver

Getting security ‘right’

We love to talk about doing things right, there is no such things as doing it right. Perfect is the enemy of good and also of modern infrastructure.

mobile security / unlocked data connections

Does your security solution protect against GDPR non-compliance?

Despite a seemingly complete overhaul of data security and privacy as the General Data Protection Regulation rolled out, many fall short when screening for compliance. How do you protect your organization, your clients and your...

Government building with greek columns

How GDPR impacts US cybersecurity policy

With the GDPR in full effect, expect to start seeing an impact in the US sooner vs. later. All it will take is the next major data breach for the American public to start demanding ownership of their personal data.

signature signing contract handwriting cursive

Do those stellar security obligations really provide any protection?

It is vital for businesses to understand limitation-of-liability clauses in vendor contracts, especially when recovering damages from a cybersecurity breach. Here is insight into these clauses, including how businesses can best draft...

open door with sunlight shining through

Feeling secure enough to use open source for IAM projects

Using open source software to add functionality to your IAM systems within a secure framework.

Load More