CISOs need to engage with the board
Cyberspace has placed information risk firmly on the boardroom agenda, and CISOs need to engage with their boards to ensure their organizations understand and manage …
The CSO perspective on healthcare security and compliance
Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …
A look into the EC Council hack
Update: Wednesday, 22 May 2013 – Tal Be’ery: “We had analyzed a screenshot of what we had thought at the time the current EC council site hack. Later we had …
IT security jobs: What’s in demand and how to meet it
The information security job market continues to expand. In fact, according to a report by Burning Glass Technologies, over the past five years demand for cybersecurity …
Tips for validating DDoS defenses
Prolexic has issued a number of recommendations that organizations can use to validate their DDoS defenses, as well as protection services they receive from mitigation …
No money mule, no problem: Recruitment website kits for sale
A valuable asset in the fraud world, money mules enable cybercriminals to cash out stolen money. After cybercriminals take over a victim’s account, they enlist the help …
Car and electronics shoppers at risk of escrow fraud
Cars, motorbikes and electronics top the list of items that scammers use most to swindle online shoppers in the growing underworld of escrow fraud, according to our recent …
Bringing networking and security together through network automation
The past ten years have seen a proliferation of increasingly complex network devices. Coupled with the recent rise in adoption of BYOD policies, mobile working practices, …
The CSO perspective on risk management
Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …
The importance of secure coding
Jim Manico is the VP of Security Architecture for WhiteHat Security. In this video recorded at Hack In The Box 2013 Amsterdam, Manico illustrates the importance of secure …
Why wiping decommissioned IT assets should be a must
Last week I’ve written about the ways confidential data can leak outside the organization if the IT security team doesn’t pay attention to printers, shredders, or …
Do young people care about privacy?
Everywhere I go, I hear some variation of the claim that “young people today just don’t care about privacy.” This is something that people widely seem to …