How does Star Trek's information security stack up against current cybersecurity hygiene best practices? Turns out the future's not so bright.
The EY "Global Infomation Security Survey" revealed that CISOs and executives have a long road ahead when it comes to improving communication — but it is indeed a road, not an unbridgeable chasm.
Gartner predicted that information security spending will reach $86.4 billion in 2017. Other trends included security service bundles and IT outsourcing.
President Trump's executive order on cybersecurity sent a powerful message about the real-world implications of information security.
With so much disinformation being reported in the news and spread through social media, it's hard for security professionals to know what to believe.
The state of government IT was a central issue during last year's election and continues to drive decision-making within Trump's administration.
Organizations seeking to prevent insider threats should establish red, blue and black teams to produce threat models for multiplayer games.
When it comes to securing industrial IT environments, the implications of game theory vary depending on whether the parties cooperate, collude or defect.
This is the first installment in a four-part series about industry CISOs. Be sure to check back next week for the second chapter. Any effective information security program has a dedicated professional in charge. This person is usually the chief...
Insider threats can achieve industrial sabotage by slowly gaining control over individual projects, programs and then eventually the company.