The evolution of vendor risk management in financial institutions
The Financial Services industry has long been recognized as a leader in establishing many of the security and fraud detection practices that have influenced best practices in …
Information security innovation and research
Sin-Yaw Wang is the Vice President of Engineering at WatchGuard Technologies. In this interview he talks about the the main challenges for delivering innovative information …
How much pressure do infosec professionals face?
Businesses were under increased pressure to secure their organizations in 2014 and expect that pressure to increase in 2015, according to Trustwave. Survey respondents also …
As confidence sinks, cyber attacks rise
While IT security spending is increasing, confidence is falling. In surveying more than 800 security decision makers and practitioners, the CyberEdge Group found that more …
Data classification ranks in top 3 security controls
Bloor Research surveyed 200 senior IT security executives in the UK and the US, all with organizations that have more than 1,000 employees. More than half (54%) of …
What security tools do healthcare organizations lack?
The Health Information Trust Alliance (HITRUST) has completed a three-month review of its approach to cyber risk management for the healthcare industry. The effort was focused …
3 ways to advocate for data security at your company
There’s an unfortunate tendency among many businesses to rank data security well below other functions. It’s a familiar story: firms slash resources at the first …
How directors manage today’s key challenges
A nationwide survey of nearly 500 directors highlighted that daily risk oversight continues to be one of the central challenges facing boards, as well as an increased focus on …
Healthcare security spending to reach US$10 billion by 2020
The healthcare sector is ill-prepared for the new cyberage. Hospitals, clinics, trusts, and insurers are under attack from malicious online agents. The value of personal …
Continuous Diagnostics and Mitigation capability requirements need re-prioritization
There is a lot to like in the $6 billion Continuous Diagnostics and Mitigation (CDM) program being administered by the DHS across more than 100 federal civilian agencies. The …
CTOs targeted with tax-themed phishing emails carrying malware
Tax-themed phishing emails targeting CTOs of tech companies have been spotted by researchers at Talos, Cisco’s security intelligence and research group. The initial …
96% say ISO 27001 is important for improving security defenses
Already established as international best practice, the information security management standard ISO 27001 has become an effective weapon in the fight against cyber crime. It …