CISO September 24, 2015 High-Impact Security Flaws and Why They’re Still Being Overlooked 2 min read - Seemingly simple security flaws can cause major damage for organizations, most often in the form of massive data breaches caused by the vulnerability.
CISO September 23, 2015 Travel Security: What to Know Before You Head to High-Risk Locales 4 min read - Implementing a travel security program within an enterprise involves learning how to communicate certain risks to employees on the move.
CISO September 21, 2015 CISO Influence: The Role of the Power Distance Index and the Uncertainty Avoidance Dimensions 4 min read - CISOs must always communicate carefully, and the Power Distance Index can help these executives do that within a multicultural organization or meeting.
September 10, 2015 Identify Theft Accounts for 75 Percent of the Top Breaches in 2015 2 min read - A recent report from Gemalto detailed the top breaches from the first half of 2015 and showed that identity theft is a prevailing trend in cybercrime.
Endpoint September 1, 2015 The Danger in Downplaying Smartphone Security 2 min read - Enterprises can't afford to sweep smartphone security under the rug. In the age of bring-your-own-device, mobile security is essential.
CISO August 31, 2015 Protecting Student Information: A CISO’s Point of View 4 min read - David Sherry, the CISO at Brown University, describes the steps taken to secure student information without inhibiting information sharing.
CISO August 24, 2015 CISO in the Wild: Stepping out of the C-Suite to Take on Server Compliance 4 min read - CISOs are often separated from the operational processes and regulations they enforce. So what happens when a CISO makes an appearance in the wild?
August 20, 2015 Research Shows DDoS Attack Volumes Doubling as Threat Vectors Proliferate 2 min read - Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, new research shows.
Application Security August 18, 2015 Is the Internet of Things Too Big to Protect? Not if IoT Applications Are Protected! 3 min read - The massive growth of the Internet of Things (IoT) is making it harder to secure applications, but organizations can protect themselves via best practices.
Intelligence & Analytics July 30, 2015 Is Black Hat Coming of Age? 2 min read - This year's iteration of the annual Black Hat USA conference is poised to be one of the best yet, with a slate of presentations and tools worth seeing.