Opinions

Computerworld - Scary Tech [Slide-05] - Encryption systems with backdoors
Network World: IoT Hacks [slide-05] > Car Talk > Automotive hacks

universal or multifunctional Swiss Army-like tool or toolkit to build, develop or repair

Best-of-breed security products still dominate -- kind of

CISOs want products that can prevent, detect, and respond to cyber attacks, but they also consider product consolidation and integration.

5 small business security

Small Business Saturday means it’s time for an annual cyber refresh

5 steps that SMBs should take to review and refresh their security policies and procedures.

square peg round hole no fitting bad idea

The end of security as we know it

Beware of vendors who attempt to abdicate their responsibility to unnamed third-party contractors.

cyber resilience shock absorber

Taking a moment to appreciate how far we’ve come

There is unprecedented responsibility on enterprises leaders and their security teams to create a culture of security and instill organizational cyber resilience.

spinning globe smart city iot skyscrapers city scape internet digital transformation

Remember: It’s not all about the 1s and 0s

Don't forget the role of physical security in protecting your assets...even the digital ones.

Windows security and protection [Windows logo/locks]

Experience an RDP attack? It’s your fault, not Microsoft’s

Follow Microsoft's basic security guidelines for Remote Desktop Protocol and you'll shut down hackers who try to exploit it.

Abstract numbers for stock exchange

Data exchanges know all about you; soon they'll impact cybersecurity

Our digital lives, physical locations and credit card usage are traded on exchanges. If there’s such a thing as “surveillance capitalism,” data exchanges are the closest thing to three letter intelligence agencies.

a clock half-submerged in water

Cyber security relics: 4 older technologies still plaguing the infosec world

Understanding the issues of the past can help us be better equipped to deal with seemingly new issues in the present.

Slacker guy with feet on desk

4 dangerous security assumptions to avoid

Many organizations take steps to guard against data breaches, employing new policies, tools and strategies that make them feel protected, but their defenses may not be as strong as they think. Unfortunately, this false sense of...

10 cloud security breach virtualization wireless

6 takeaways from McAfee MPower

The company articulates its device-to-cloud security strategy with vision and series of announcements.

intro cyber attack maps

Defense, security and the real enemies

The end of the Cold War meant that the countries that threatened American democracy and our way of life didn’t go away. They adapted to use technology to attack us instead. Now that the extent of these attacks is being made known, we...

Election 2016 teaser - A hacker pulls back the curtain on United States election data

3 ways politicians could prevent voting machines from being hacked (if they wanted to)

The current state of voting security is laughably bad, but we know how to secure voting machines. The problem isn't technical, but a lack of political will.

cyber security lock padlock firewall code breach password

Trend Micro shines a light on its new cybersecurity solutions

Trend Micro provides an overview of its new cybersecurity products, platforms, and services.

detective with magnifying glass

5 open source intrusion detection tools that are too good to ignore

Everyone should employ an intrusion detection system (IDS) to monitor their network and flag any suspicious activity or automatically shut down potentially malicious traffic. We look at five of the best open source options.

1 tsunami

The IoT tsunami is coming

The Internet of Things will change everything, in all sectors...and you'd better have a plan.

supply chain management problems in need of solutions

The fix for IT supply chain attacks

Bloomberg's China spy chip story underscores weaknesses in computer supply chain security. The solution needs to be global.

network interface connections

Zeek: A free, powerful way to monitor networks, detect threats

Bro may have a new name -- Zeek -- but the platform has the same rich functionality for security professionals to help them analyze network data and detect threats.

ship wheel captain leadership

Improving cybersecurity culture requires clarity, commitment

Only a third of employees have a sound understanding of their role in their organizations’ security culture.

Load More