Clamour for Cloud apps increases corporate data breach risk
Employees bringing in their own devices and choosing their own application services is significantly increasing the risk to enterprise data.
View ArticleRSA Conference 2012 sneak peek: cloud, big data, and mobile
There are fewer topics stirring bigger buzz among information security professionals than big data, Cloud security, and mobile. So it's no surprise that those topics will dominate the discussions this...
View ArticleCloud Security Alliance launches innovation program, eyes mobile threats and...
SAN FRANCISCO: Whether already computing in Cloud environments, planning to do so soon, or just thinking about it - how those systems will be kept secure is once again a topic that is front and center...
View ArticleRSA Conference 2012: Former NSA director says secure Clouds can't come fast...
At the third annual Cloud Security Alliance (CSA) summit today, Michael McConnell, former director of the National Security Agency, urged the audience of 1,200 security experts to do what they can to...
View ArticleKey advice: Being prepared for when the Cloud really fails
Everything works well in the Cloud, until it doesn't.
View ArticleMDM: Part of the mobile security solution?
The good news for enterprises: Mobile devices are packed with power. A new iPhone is 100 times lighter, 100 times faster, and 10 times less expensive than the luggable notebooks of the early 1980s.
View Article7 essentials for defending against DDoS attacks
Go ahead and ask CSOs from the nation's largest banks about the myriad distributed denial-of-service (DDoS) attacks they've experienced in recent months. They're not going to tell you anything.
View ArticleiOS vs. Android: Which is more secure?
With millions of new iOS and Android devices pouring into the enterprise every quarter, it's important to know just how much risk these devices bring - and if one mobile operating system has an edge...
View ArticleMoving toward smart and secure continuous software delivery
It's no surprise that security and application development teams often find themselves locking horns. One wants applications and new features to roll out -- and swiftly -- and the other is often more...
View ArticleCybersecurity 2014: Breaches and costs rise, confidence and budgets are low
In 2014, it seemed that no industry went unscathed. The data breaches this year were broad and deep. Software maker Adobe was hit for 152 million records. Online marketplace eBay was drained of another...
View ArticleIn Pictures: 10 tips to secure your iPhone
No more is it enough to think that securing your iPhone with a simple 4 digit PIN is adequate.
View ArticleSix failings common to entry-level cyber security job seekers
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.
View ArticleSix entry-level cybersecurity job seeker failings
When it comes to hiring, enterprise security teams can use all of the help that they can rally. But when it comes to hiring entry-level talent, that's not as easy as it may seem.
View Article2015 State of Cybercrime: Enterprise fight is stuck in stall
The year of cybercrime since our most recent US State of Cybercrime Survey has been nothing less than stunning. There were the Home Depot and JP Morgan Chase data breaches, the Sony Pictures fiasco,...
View ArticleWhen it comes to Cloud security which is better? Heavy hand or gentle policing?
When it comes to successfully managing cloud use within the enterprise, some security organizations try to establish and enforce firm lines between what is permissible and what is banned, while others...
View Article
More Pages to Explore .....