CISO November 13, 2015 Security On Demand: From Endpoint to Mainframe, Passing Through the Cloud 2 min read - There are many security tools available to enterprises today, and the current threat landscape is forcing providers to alter their offerings.
November 12, 2015 UK Spy Agency Partners With Industry and Academia on Cybersecurity Research Program 2 min read - The U.K. government, the spy agency GCHQ and various academic and business partners are pulling together for a cybersecurity research program.
October 6, 2015 Common Vulnerabilities: The Key to Better Cybersecurity? 2 min read - A new report finds companies share common cybersecurity vulnerabilities. Can this common ground be used to enhance network security?
Energy & Utility September 21, 2015 Cyberthreat Information Sharing in the Energy Sector 2 min read - The energy industry is a prime target for sophisticated cyberattacks, but information sharing across companies can help protect critical infrastructure.
Intelligence & Analytics September 16, 2015 Forecasting a Breach Is Like Finding a Needle in a Haystack — Not That Tough 5 min read - Forecasting a data breach doesn't have to be difficult. With the help of threat intelligence and collaboration, organizations can spot vulnerabilities.
Data Protection September 15, 2015 Should Enterprises Look to Universities When It Comes to Information Protection? 4 min read - Organizations can learn a lot from academic universities with regard to information protection, cybersecurity and information sharing.
Software Vulnerabilities September 8, 2015 Markdown: Designer Vulnerabilities Get a Fresh CVSS v3 Look 3 min read - The Common Vulnerability Scoring System (CVSS) has been completely redone to more accurately reflect the scope and impact of vulnerabilities.
CISO August 31, 2015 Protecting Student Information: A CISO’s Point of View 4 min read - David Sherry, the CISO at Brown University, describes the steps taken to secure student information without inhibiting information sharing.
Data Protection August 26, 2015 Blurred Lines: Researching the Ashley Madison Data 4 min read - Ashley Madison's recent data dump provided security researchers with a treasure trove of information — but is looking into the breach completely legal?
X-Force August 25, 2015 The Myth of the Omnipotent Hacker 3 min read - The way movies and television shows portray a hacker is far off from reality. In today's collaborative world, attackers are often working in crime rings.