Information Security

Information Security | News, how-tos, features, reviews, and videos

Android Notifications
avengers wallpaper

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

notre dame fire 2019 destruction blaze historic building paris france

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As...

julian assange wikileaks 1

Julian Assange arrested: Hero of transparency and privacy, or villain against nations?

Just because you can take something doesn’t mean you should...or that it’s the right thing to do.

ai in biopharma 1000x630

Stakes of security especially high in pharmaceutical industry

Pharmaceutical companies face a special level of responsibility, as it is essential that consumers are able to trust in their prescription drugs and related medical treatments, and that patients are able to reliably access them while...

wrenches in different sizes / an iterative process of development or repair

The cybersecurity technology consolidation conundrum

As point tools come together as platforms and solutions, cybersecurity professionals need to think outside the box about procurement, implementation, and operations.

Facebook Data Debacle - Android

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

things to do sign list deadlines

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...

graduate school college certification mortar board valedictorian cole keister via unsplash

What can we learn about infosec from the Varsity Blues college admissions scandal?

The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...

asia china flag grunge stars pixabay etereuti

Huawei and Apple smartphones are both made in China – why is only one banned in Australia?

While Chinese smartphone manufacturer Huawei has been banned from the Australian 5G network rollout, Apple was welcomed with open arms despite also using China to produce phones. So, what’s the difference?

certification school pencils diversity creative team by evgeny555 getty

Cybersecurity education in the age of acceleration

The cyber threat landscape demands professional development initiatives.

orange number 5 pool ball top five 5 tips

Top 5 solutions to reduce ‘cyber friction’

The biggest problem areas and solutions to reduce friction between cybersecurity, privacy and legal teams.

glasses on book study certification skills programmer school by james sutton unsplash

Navigating a challenging cybersecurity skills landscape

As much as tools and technology evolve in the cybersecurity industry, organizations remain reliant on clever, well-trained humans with incisive critical thinking skills to protect themselves from the perilous cyberthreat landscape.

acquisition hostile takeover

Consolidation: Why there should be big acquisition announcements at RSA

The question isn't if, it's when one of the major tech companies will announce a big security move. If they don’t, they're at risk of falling behind.

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

The CSO and CPO role just dramatically expanded overnight

How two high-profile incidents highlight the changing definition and scope of security and privacy.

gated community open source closed lockin

Combatting drama and barriers in the infosec community

At its onset, the infosec community was very inclusive and welcoming…when others were not. Over the years, we’ve forgotten where we came from and why. Self-appointed gatekeepers leaders of who belongs in the community (or not) have...

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

cyber security lock padlock firewall code breach password

Enterprises need to embrace top-down cybersecurity management

CISOs must manage cybersecurity based upon their organization’s mission, goals, and business processes, not the technology underpinnings.

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

Load More
You Might Also Like