Software Vulnerabilities January 19, 2015 Cross-Site Scripting Attacks Pose Ongoing Threat 2 min read - Cross-site scripting (XSS) attacks exploit Web design tools to sneak malicious scripts onto users' browsers. Preventive measures can minimize the risk.
Intelligence & Analytics January 7, 2015 Malicious Domains Can Give You the .Biz 2 min read - Understanding the common tactics that cybercriminals use to mask malicious domains is key to keeping users from clicking on harmful links.
CISO December 30, 2014 External Threats a Top Concern for CISOs 2 min read - What is the biggest challenge for CISOs today? Security leaders will continue to focus on external threats for the foreseeable future.
CISO December 17, 2014 Security Technology a Top Focus for CISOs 2 min read - Security leaders are focusing their attention on improving security technology in the face of innovations in the cloud, mobile devices and big data.
CISO December 11, 2014 CISO Assessment: For Security Leaders, a Stronger Voice 2 min read - According to IBM's third annual CISO assessment, CISOs are gaining more influence in the C-suite in response to growing security threats.
Intelligence & Analytics December 3, 2014 Protecting Information Security With a Moat of Intelligence 2 min read - Endpoint security is no longer enough, so instead of a moat surrounding their network, firms need a "moat of intelligence" to detect threats.
Cloud Security November 24, 2014 Staying Ahead of Threats in a Changing Technology World 2 min read - Staying ahead of threats is the key to information security in the cloud and mobile era. Security intelligence is a vital part of any program.
Intelligence & Analytics October 10, 2014 Cybersecurity: Learn to Think Like the Enemy 2 min read - The only way to really test your organization's cybersecurity measures is to attack them — which means learning to think like a black-hat hacker.
Retail October 7, 2014 The Top 5 Retail Breaches 3 min read - These top 5 retail breaches demonstrate why security is vital for retailers and highlight the steps companies should take to keep their customers safe.
Endpoint September 19, 2014 Bring Your Own Device: The Enterprise IT Challenge That Isn’t Going Away 2 min read - The bring your own device (BYOD) trend is probably here to stay, which means companies will need to secure their entire software stack, not just endpoint.
CISO September 18, 2014 How to Enhance Security With Persuasive Technology 2 min read - Persuasive technology can be used as a tool to make security more natural for users who may not necessarily be prioritizing safe practices.
August 13, 2014 Data Security Gets a Wake-Up Call From Blackphone 2 min read - Blackphone offers a robust security and privacy suite, which is handy for sophisticated users but not a complete solution for all mobile users.