Information Security

Information Security | News, how-tos, features, reviews, and videos

glasses on book study certification skills programmer school by james sutton unsplash

Navigating a challenging cybersecurity skills landscape

As much as tools and technology evolve in the cybersecurity industry, organizations remain reliant on clever, well-trained humans with incisive critical thinking skills to protect themselves from the perilous cyberthreat landscape.

acquisition hostile takeover

Consolidation: Why there should be big acquisition announcements at RSA

The question isn't if, it's when one of the major tech companies will announce a big security move. If they don’t, they're at risk of falling behind.

man sitting on chair on dirt road tornado overwhelmed overworked stressed disruption disaster recov

The CSO and CPO role just dramatically expanded overnight

How two high-profile incidents highlight the changing definition and scope of security and privacy.

gated community open source closed lockin

Combatting drama and barriers in the infosec community

At its onset, the infosec community was very inclusive and welcoming…when others were not. Over the years, we’ve forgotten where we came from and why. Self-appointed gatekeepers leaders of who belongs in the community (or not) have...

poaching talent fishing lures bait catch recruit

6 ways to equip your phishing tackle box

Like many of the threats in cybersecurity, using a comprehensive and business-driven approach to reveal risk can help you focus your efforts on what matters most.

cyber security lock padlock firewall code breach password

Enterprises need to embrace top-down cybersecurity management

CISOs must manage cybersecurity based upon their organization’s mission, goals, and business processes, not the technology underpinnings.

australia law legal

Australia and Huawei: Why the ban?

National security questions have resulted in mega smartphone manufacturer Huawei being banned by the Australian government from participating in the that nation’s 5G network rollout.

women gender program code monitor

Have we doubled the number of women in infosec?

According to a recent (ISC)2 report, women now comprise 20% of cybersecurity workers. But without defining what jobs are being included, it’s unclear whether we’re truly making progress.

network iot world map us globe nodes global

Cybersecurity: A global threat that we can control

Protecting data and thwarting cyberattacks now have ascended alongside dealing with natural catastrophes as the most pressing threats demanding the world’s full attention.

data security encryption

Can owning your company’s encryption lead to better security?

While the current vendor environment clearly poses significant challenges and risks to businesses entrusting them with their data, use of encryption can, at least in many cases, materially mitigate that risk. The devil, however, is in...

tinfoil man /crazy conspiracy theories / camouflage

Conspiracy theories and cognitive dissonance…and how to combat them

Can information security leaders help overcome the challenges wrought by a public that's increasingly ready to believe – and act on – even the wildest conspiracy theories?

1 volume of data breach pile of paper confidential documents

The politics of ‘Have I Been Pwned’

Data breaches are not created equal. Business leaders and security managers must beware the dangers of FUD and hype created around notification of old breaches.

a hooded figure targets a coding vulnerability

Breaches, market volatility and the government shutdown: Security in the crosshairs

If the start of 2019 is anything to base the year ahead on—with data breaches, shakiness in the market and the government shutdown negotiations at an impasse—cybersecurity experts are going to have their hands full with increasingly...

mobile apps

Data Privacy Day 2019

GDPR was just the beginning. It started in the EU, but it’s waking up the world on just how much our privacy is being violated.

virtual eye / digital surveillance, privacy / artificial intelligence / machine learning

Take time to think about security amidst the greatest gadget show on the planet – CES

Let us put our thinking caps back and ask the right questions.

big data messaging system / information architecture / mosaic infrastructure

Big data: too valuable and too challenging to be overlooked

The positive potential of big data is enormous, spanning virtually all industries and impacting both the public and private sectors. However, we must also be mindful of safeguarding big data as much as collecting and utilizing it.

solidary individual walks alone through a tunnel of light

Real life, why people escape it – and bringing them back

Security isn’t just about technology - that's only 10% of the total solution. Most of what we try and do is build awareness and communication between our team members and the rest of the company. And that requires being active social...

nest cam iq review on shelf

Our homes are not the impenetrable fortresses they once were

Today’s homes are loaded with connected devices. However, security practitioners are still trying to catch up with the growth of smart devices.

network security hacker virus crime

A look back at cybercrime in 2018

Prepare now to mitigate the most cyber risk in 2019!

4 .root cause exploits breach raining data binary psd

Has the word ‘breach’ has outlived its usefulness?

When someone says a data breach has happened, it’s generally understood to mean that attackers have broken into a company and stolen sensitive information. But after a growing number of high-profile privacy gaffes, the definition of...

Load More
You Might Also Like