Government April 16, 2015 Federal Cybersecurity Legislation Is on the Way — But Don’t Relax 3 min read - As cybersecurity incidents increase in frequency and severity, new legislation is being proposed to share information among organizations.
X-Force April 16, 2015 The Path Forward With Threat Intelligence and Sharing 3 min read - Threat intelligence sharing is becoming imperative for improving organizations' security, but it needs the right collaborative approach to be successful.
Endpoint April 15, 2015 Hiding Behind Android Runtime 4 min read - I recently gave a presentation at Black Hat Asia in Singapore. My talk discussed possible ways to create user-mode rootkits in the new Android Runtime.
April 15, 2015 Annual Threat Report: POS, HTTPS and SCADA Attacks on the Rise 2 min read - An annual threat report on the biggest IT security issues says CISOs should be concerned about cybercriminals hitting POS, SCADA and HTTPS systems.
Identity & Access April 15, 2015 To Err Is Human: Why Your Users’ Identity Is Your Security’s Weakest Link 2 min read - Organizations should consider using an identity and access management solution to reduce their risk of a breach related to human error.
Data Protection April 15, 2015 The Business of Cyber Risk Assessment for Data Security 2 min read - Many data security solutions have a hard time effectively addressing and measuring cybersecurity risks in an enterprise environment.
April 14, 2015 Gartner: IBM Security Growth Outpacing the Overall Security Software Market < 1 min read - The growth of IBM Security is outpacing the overall security software market by nearly three times, according to a recently released report from Gartner.
Fraud Protection April 14, 2015 Stolen Identity Tax Refund Fraud: Who Is Getting Your Refund? 3 min read - Stolen identity tax fraud is a growing problem in the United States as criminals steal victims' PII and file returns on behalf of them.
CISO April 14, 2015 RSA Conference: Six Must-Attend Sessions for CISOs 3 min read - If you are a CISO attending the RSA Conference 2015, check out these top educational sessions that can help you improve your role and responsibilities.
Cloud Security April 14, 2015 The Grand Challenge for Cloud Security 2 min read - The flexibility and openness of the cloud has created a number of cloud security concerns in terms of the privacy, integrity and availability of data.