CISO November 14, 2016 20 Eye-Opening Cybercrime Statistics 3 min read - The many security reports issued this year contain countless cybercrime statistics that should encourage IT professionals and end users to be more careful.
November 10, 2016 WoT Privacy Breach: Trust Tanks as Browser Add-On Caught Selling User Data 2 min read - The WoT privacy breach highlights the commonplace nature of third-party data selling and frequent failure to read the fine print in user agreements.
Banking & Finance November 10, 2016 The Rise of the Cashless Society 2 min read - As cryptocurrencies gain traction with banks and consumers, IT professionals must consider the cybersecurity implications of becoming a cashless society.
November 8, 2016 Indian Embassy Hack: Security Breached in Seven Countries, Citizen Data Compromised 2 min read - An Indian Embassy hack launched by supposedly well-intentioned penetration testers compromised more than 500 personal records of Indian citizens.
November 7, 2016 A Holiday Smartphone Upgrade Can Expose Enterprise Data 2 min read - Thinking about a holiday smartphone upgrade? Be sure to erase any sensitive corporate data before upgrading or reselling a mobile device.
Intelligence & Analytics November 7, 2016 Finding the Right Apps to Streamline Data Collection 3 min read - The IBM Security App Exchange includes over 70 applications to help security teams streamline data collection and share information more efficiently.
Retail November 2, 2016 Seasonal Employee Security Risks: Present Danger, Proactive Defense 4 min read - Companies that enlist extra help during the holidays must carefully vet temporary hires and restrict access to manage seasonal employee security risks.
CISO October 28, 2016 Questions Every CIO Should Ask the Cybersecurity Leader: Part 3 2 min read - The cybersecurity leader and CIO must collaboratively address 10 common risk management controls to protect the organization's most sensitive data.
Artificial Intelligence October 26, 2016 Preparing for the Next Era of Computing With Quantum-Safe Cryptography 4 min read - The race is on to devise an effective method of quantum-safe encryption to cope with the security implications of this emerging technology.
CISO October 25, 2016 The Role of the CISO and Information Security in the Construction Industry 2 min read - Many companies fail to recognize the importance of information security in the construction industry. A CISO or CIO is critical to lead security efforts.