Infosec industry: Time to put up or shut up
The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
A holistic approach to protecting intellectual property
Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …
Inside corporate privacy programs at Fortune 1000 companies
The International Association of Privacy Professionals (IAPP) released a survey of corporate privacy programs at Fortune 1000 companies. The survey found that while corporate …
Three branches of security: Strengthening your posture with checks and balances
With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …
Targeting security weaknesses in the phone channel
Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …
The impact of disconnected security strategies
39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …
Integrating IT security at the board level
2014 has seen an upsurge in public awareness of cybercrime, with a flurry of high-profile security breaches hitting the headlines. The sensationalised coverage of the …
CISOs troubled by complex issues
Although nearly one-half (48 percent) of all state CISOs reported incremental increases to cyber security budgets, insufficient funding remains the leading barrier to battling …
The harsh realities of protecting businesses
Ninety percent of CIOs and CTOs believe the job of keeping their enterprise protected is becoming more challenging according to new research from Fortinet. Serious boardroom …
Board practices regarding IT oversight and cybersecurity
Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …
Every budget is now an IT budget
IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business …
Featured news
Resources
Don't miss
- Critical Wing FTP Server vulnerability exploited in the wild (CVE-2025-47812)
- Where policy meets profit: Navigating the new frontier of defense tech startups
- Four arrested in connection with M&S, Co-op ransomware attacks
- Ruckus network management solutions riddled with unpatched vulnerabilities
- What EU’s PQC roadmap means on the ground