Expert analysis
Enabling secure file sharing in the enterprise
As enterprise mobility meets collaboration, the workplace as we know it is transforming. Gone are the days when employees stopped working after leaving the office or …
The most unpopular person in the room
That’s me. At least I was the week I wrote this. I had the wonderful opportunity to speak at a number of conferences that were not solely related to security. It was …
Shaping mobile security
Most of us are familiar with the “triangle’ project management model, which highlights the constraints on delivering results in projects. The three corners of the …
Infosec industry: Time to put up or shut up
The information security industry is one of the most exciting industries to be involved in. It offers many opportunities to exercise one’s passion and curiosity about …
Vigilance and the Enterprise of Things
Most enterprises allow BYOD in their environment, with varying levels of supervision. Typically, these are tablets and smartphones but the number of other Internet of Things …
A holistic approach to protecting intellectual property
Protecting intellectual property (IP) is high priority for security professionals, but IP can be a vague term. What exactly is included under the umbrella of IP? And …
Aligning risk analysis and IT security spending
IT security spending should be aligned with risk analysis results. Too frequently, though, this is not the case. Thought leaders in information security have been describing a …
Overcoming Big Data security obstacles
When it comes to security, Big Data can be the cause of many obstacles. As Big Data often contains enormous quantities of personally identifiable information, privacy becomes …
Enterprises must prepare for attacks on supply chain and POS in 2015
One thing is certain – there is plenty of job security in the business of protecting data. Attackers keep upping their game therefore, so must we. 2014 can be …
Three branches of security: Strengthening your posture with checks and balances
With Election Day around the corner, we thought it an appropriate time to take a look at the checks and balances model that has served the United States well for over two …
Targeting security weaknesses in the phone channel
Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …
Fixing the broken windows of software security
Last month I discussed how we can fix software security issues only by making sure we use libraries and frameworks that don’t allow classes of vulnerability to exist. Of …
Featured news
Resources
Don't miss
- Job-seeking devs targeted with fake CrowdStrike offer via email
- January 2025 Patch Tuesday forecast: Changes coming in cybersecurity guidance
- The SBI fake banking app shows that SMS authentication has had its day
- Preventing the next ransomware attack with help from AI
- Banshee Stealer variant targets Russian-speaking macOS users