Information Security
Information Security | News, how-tos, features, reviews, and videos
What is information security? Definition, principles, and jobs
Information security is a set of practices intended to keep data secure from unauthorized access or alterations. Here's a broad look at the policies, principles, and people used to protect data.
Insider threats: From McDonald’s Monopoly to today, how to address how little has changed
What have we learned this year? Insider threats haven’t changed much. Companies and people still focus on the bright, shiny new technologies or expected windfalls from major projects. Many ignore the governance, controls and processes...
SOAPA vs. SOAR: How these security terms differ
SOAPA and SOAR are vastly different. Security orchestration, automation, and response (SOAR) tools represent a component of a security operations and analytics platform architecture (SOAPA).
What Andrew Luck’s retirement can teach infosec leaders
Andrew Luck was an incredible quarterback who performed at very high levels despite numerous hits and injuries. At the age of 29, he walked away from the sport he loved and untold millions of dollars. This action, and the reaction...
Trust isn't new, so why are we acting like it is?
The industry is missing the mark when it comes to understanding – and protecting – this high value asset.
Father’s Day and good role models
Father’s Day is a day to celebrate those who take up the role of being one to their children, whether or not they are the biological one, or even the same gender. We need to recognize those who take up that role non-traditionally. We...
Is AI fundamental to the future of cybersecurity?
Thanks to the quickening pace of natural language capability development, artificial intelligence will likely be at the forefront of the next wave of cybersecurity tools.
Developing an information security decision-making matrix
It is possible to create a simple, bright-line means of triaging engagements to determine whether heightened security and privacy measures should be required.
Federal cybersecurity agency on the way?
As human activity migrates into the online space, keeping the bad guys from mucking it all up becomes paramount. Does that mean it’s time for a federal cybersecurity agency?
Moving beyond template-based notifications
How to identify your gray area stakeholders for more effective incident response communications.
‘Nuff said!
The Marvel Cinematic Universe started in comic books as the creations of three main visionaries: Stan Lee, Jack Kirby and Steve Ditko. They weren’t always successful. Through following the vision of their creators, a new group was...
Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law
A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.
What lessons can we learn from Notre Dame to better prepare for cyberattacks?
The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As...
Julian Assange arrested: Hero of transparency and privacy, or villain against nations?
Just because you can take something doesn’t mean you should...or that it’s the right thing to do.
Stakes of security especially high in pharmaceutical industry
Pharmaceutical companies face a special level of responsibility, as it is essential that consumers are able to trust in their prescription drugs and related medical treatments, and that patients are able to reliably access them while...
The cybersecurity technology consolidation conundrum
As point tools come together as platforms and solutions, cybersecurity professionals need to think outside the box about procurement, implementation, and operations.
Facebook stashing plain text passwords is a wake-up call to improve GRC
Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.
Whip your information security into shape with ISO 27001
The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...
-
White Paper
-
Solution Brief
Sponsored -
eBook
Sponsored -
White Paper
-
Research/Infographic
Sponsored