Opinions

ethics typewriter keys values morals
avengers wallpaper

welcome to north dakota sign 42678037784

North Dakota: An innovative and leading cybersecurity state

North Dakota is addressing the cybersecurity skills shortage with policies and programs for government, education, and business.

Hands write on paper with pen.

FINRA Rule 4512: U.S. SEC approves electronic signatures

The updated FINRA Rule 4512(a)(3) is now in effect, striking a blow against outdated regulations.

identity concept 164551610

Using citizen IDs for commercial services will take an identity ecosystem

Citizen identity systems like the UK’s Verify initiative are costly. It only makes sense to offset that cost by allowing commercial entities to utilize citizen IDs. Here's what it will take.

artificial intelligence / machine learning / robot reading stack of books

Navigating the AI hype in security: 3 dos and 2 don'ts

“Very few things that advertise AI have the goods under the hood. I think what people are touting as innovative AI is still very basic, and we can go a lot further.” — Rick Grinnell, founder and managing partner, Glasswing Ventures

sacramento california state house

Proposed changes to California Consumer Privacy Act of 2018 could rewrite privacy law

A recently proposed repeal of 2018's CCPA called the PAA would shift California even closer to the requirements of the GDPR.

notre dame fire 2019 destruction blaze historic building paris france

What lessons can we learn from Notre Dame to better prepare for cyberattacks?

The Notre Dame cathedral – one of mankind’s greatest achievements – is not only a monument to Catholicism, but also to the French people who built and maintained this landmark over centuries…and will now rebuild this icon again. As...

trojan horse virus

What is Emotet? And how to guard against this persistent Trojan malware

The Emotet Trojan is one of the biggest malware threats in recent years. Here's what you can do to safeguard your business.

julian assange wikileaks 1

Julian Assange arrested: Hero of transparency and privacy, or villain against nations?

Just because you can take something doesn’t mean you should...or that it’s the right thing to do.

Binary stream flowing through the fingers and palm of an upturned hand.

The ethical use of data

When thinking about data privacy and security, the focus is typically on how to keep the bad guys from gaining unauthorized access to our data. We spend billions of dollars every year as an industry to protect our data, and that of...

ai in biopharma 1000x630

Stakes of security especially high in pharmaceutical industry

Pharmaceutical companies face a special level of responsibility, as it is essential that consumers are able to trust in their prescription drugs and related medical treatments, and that patients are able to reliably access them while...

security system vulnerabilities - a grid of locks with several unlocked

The case for continuous automated security validation

Organizations must truly understand their vulnerabilities at all times to make the right risk mitigation decisions. Continuous automated security validation can provide that.

10 cloud security breach virtualization wireless

A hacker or your cloud provider. Who presents the greatest risk to your data?

The latest threat to your data may not be a hacker, but your own cloud provider, who can suspend performance and hold your data hostage.

security command center monitors control center getty goro denkoff

OpenC2 can accelerate security operations, automation, and orchestration

OpenC2, a standards effort from OASIS, has the potential to accelerate and automate risk mitigation and incident response. Users and vendors should jump onboard.

wrenches in different sizes / an iterative process of development or repair

The cybersecurity technology consolidation conundrum

As point tools come together as platforms and solutions, cybersecurity professionals need to think outside the box about procurement, implementation, and operations.

Facebook Data Debacle - Android

Facebook stashing plain text passwords is a wake-up call to improve GRC

Facebook storing hundreds of millions of user passwords in plain text demonstrates the urgent need for more effective governance, risk management and compliance at public companies.

things to do sign list deadlines

Whip your information security into shape with ISO 27001

The ISO 27001 standard will help you identify potential threats to the confidentiality, integrity and availability of your company data. This simple checklist will help you come to grips with one of the best and most popular...

woman leader career growth equality diversity

7 keys to a successful IT security career

Learn these traits and realities of being an IT security professional if you want a long, successful and happy career in the field.

graduate school college certification mortar board valedictorian cole keister via unsplash

What can we learn about infosec from the Varsity Blues college admissions scandal?

The Varsity Blues scandal – where rich parents paid an intermediary to get their kids into top colleges by paying off coaches to pass them off as athletic recruits (among other things) – exposed multiple operational security failures...

Load More