September 10, 2015 Identify Theft Accounts for 75 Percent of the Top Breaches in 2015 2 min read - A recent report from Gemalto detailed the top breaches from the first half of 2015 and showed that identity theft is a prevailing trend in cybercrime.
Endpoint September 1, 2015 The Danger in Downplaying Smartphone Security 2 min read - Enterprises can't afford to sweep smartphone security under the rug. In the age of bring-your-own-device, mobile security is essential.
CISO August 31, 2015 Protecting Student Information: A CISO’s Point of View 4 min read - David Sherry, the CISO at Brown University, describes the steps taken to secure student information without inhibiting information sharing.
CISO August 24, 2015 CISO in the Wild: Stepping out of the C-Suite to Take on Server Compliance 4 min read - CISOs are often separated from the operational processes and regulations they enforce. So what happens when a CISO makes an appearance in the wild?
August 20, 2015 Research Shows DDoS Attack Volumes Doubling as Threat Vectors Proliferate 2 min read - Cybercriminals are using everything from home routers and WordPress plugins to legacy directory services to launch a DDoS attack, new research shows.
Application Security August 18, 2015 Is the Internet of Things Too Big to Protect? Not if IoT Applications Are Protected! 3 min read - The massive growth of the Internet of Things (IoT) is making it harder to secure applications, but organizations can protect themselves via best practices.
Intelligence & Analytics July 30, 2015 Is Black Hat Coming of Age? 2 min read - This year's iteration of the annual Black Hat USA conference is poised to be one of the best yet, with a slate of presentations and tools worth seeing.
CISO July 27, 2015 Mobile Security: Look Beyond the Device 2 min read - An enterprise-wide mobile security framework needs to protect devices and data, all while ensuring compliance and managing access, as well.
CISO July 9, 2015 Cyber Risks: From the Trenches to the Boardroom 4 min read - Business leaders must learn to recognize, manage and mitigate cyber risks. This task requires cooperation and awareness across C-suites and boardrooms.
CISO July 8, 2015 Looking Ahead: CISO Strategies for 2020 3 min read - Certain CISO strategies will ensure an enterprise is poised to meet the challenges associated with new tech advancements, from mobile to cloud.