Please turn on your JavaScript for this page to function normally.
A holistic approach to protecting intellectual property

Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …

Inside corporate privacy programs at Fortune 1000 companies

The International Association of Privacy Professionals (IAPP) released a survey of corporate privacy programs at Fortune 1000 companies. The survey found that while corporate …

Three branches of security: Strengthening your posture with checks and balances

With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …

Targeting security weaknesses in the phone channel

Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …

The impact of disconnected security strategies

39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …

Integrating IT security at the board level

2014 has seen an upsurge in public awareness of cybercrime, with a flurry of high-profile security breaches hitting the headlines. The sensationalised coverage of the …

CISOs troubled by complex issues

Although nearly one-half (48 percent) of all state CISOs reported incremental increases to cyber security budgets, insufficient funding remains the leading barrier to battling …

The harsh realities of protecting businesses

Ninety percent of CIOs and CTOs believe the job of keeping their enterprise protected is becoming more challenging according to new research from Fortinet. Serious boardroom …

Board practices regarding IT oversight and cybersecurity

Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …

Every budget is now an IT budget

IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business …

Internet of Things to make CISOs redefine security efforts

By year-end 2017, over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of …

Big Data is big noise

Big Data was supposed to be the solution to all our security problems, but this spotlight on intruders turned out to be a mess of white noise. Hiding comfortably in that …

Don't miss

Cybersecurity news