Application Security July 29, 2015 Static Analysis Security Testing: How to Get the Most From It 2 min read - When used appropriately, static analysis security testing solutions can be an effective part of a security program, but it shouldn't stand alone.
Retail July 23, 2015 Building a Loyalty Program That Doesn’t Reward Cybercriminals 2 min read - A loyalty program is framed as a win-win for organizations and their customers, but it can also offer prizes for cybercriminals if not managed properly.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.
Retail June 17, 2015 Online Shopping Security: Best Practices for Businesses 3 min read - The major online shopping security concerns individual consumers face can serve as a blueprint for businesses searching for Internet best practices.
Data Protection May 20, 2015 Security Breaches: An Ounce of Prevention? 2 min read - There has been an increased focus on the detection of security breaches, but organizations shouldn't lose sight of the value of prevention.
Advanced Threats May 8, 2015 Ransomware Triggers Cryptographers’ Call for Action 2 min read - Ransomware is one of the biggest cyberthreats organizations face today. In response, cryptographers are calling for reform to encryption practices.
Government April 29, 2015 Feds Move Toward HTTPS Website Encryption 2 min read - A new policy announced by the White House in March requires federal websites to support traffic encryption within two years through HTTPS.
Government March 26, 2015 Cybersecurity Legislation Could Be on the Congressional Menu 2 min read - US President Barack Obama has proposed a package of cybersecurity legislation to improve public-private communication and strengthen enforcement.
Government March 23, 2015 Foreign Policy in the Age of Cybersecurity Threats 3 min read - In response to emerging cybersecurity threats and challenges, the Obama administration has launched a wide-ranging response with foreign policy goals.
Endpoint February 10, 2015 Mobile Threats Underline Mobile Security Challenges 2 min read - Recent mobile security vulnerabilities faced by Verizon and AT&T point to the scope and variety of mobile threats and how firms are responding to them.
CISO February 5, 2015 The Evolving CISO Policy Role 2 min read - More attention is being focused on the evolving role of the CISO, who must now provide technical knowledge and help shape security policies.
Malware January 21, 2015 Wiper Malware Poses Destructive Threat 2 min read - Wiper malware can destroy important data and cripple computer systems. It was most recently used in the high-profile breach against Sony Pictures.