Please turn on your JavaScript for this page to function normally.
IT security is a matter of accountability

For today’s CEO, being the victim of criminal hackers is no longer just a source of embarrassment. Being hacked often carries legal ramifications and can even cost you …

5 things infosec can learn from adventure games

As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …

Securing the U.S. electrical grid

The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private …

8 ways to talk security with executive management

The importance of information security and technology risk management continues to grow, but many risk and security professionals continue to struggle with non-IT executive …

How the role of the CSO is changing

Since Steve Katz became the first CISO back in 1996, both business leaders and the security industry in general have been thinking and rethinking the need for such a person …

Mobile device security: Tackling the risks

Mobile devices with their large data capacities, always on capabilities, and global communications access, can represent both a business applications’ dream and a …

Keeping college networks secure

Morris Altman is the Director of Network Services and Internet Security Officer at Queens College, a senior college of the City University of New York. Queens College is the …

Detect and respond

At a recent security and risk management conference I had an opportunity to talk with industry analysts about today’s challenges in network security. It seems that many …

The art and science of detecting emerging threats

In this interview, Stephen Huxter, COO at Darktrace, talks about the challenges involved in detecting emerging threats, Recursive Bayesian Estimation, the evolution of AI, and …

How secure are today’s critical networks?

In this interview, Dr. Lutz J?¤nicke, CTO at Innominate Security Technologies, illustrates the security of critical networks, the regulatory mandates for organizations in the …

Do CISOs deserve a seat at the leadership table?

ThreatTrack Security published a survey study of C-level executives that underscores a hotly-debated topic in executive circles: what is the role of the CISO? “The …

The role of the cloud in the modern security architecture

In this interview, Stephen Pao, General Manager, Security Business at Barracuda Networks, offers advice to CISOs concerned about moving the secure storage of their documents …

Don't miss

Cybersecurity news