Alex Rombak has heard your jokes about tech support, and he doesn't mind. He knows the important role he plays in supply chain security, supporting financial institutions when things go wrong.
Malware Patient Zeros: How Threat Intelligence and Herd Immunity Can Help Prevent the Spread of Infections
Organizations can borrow lessons from the medical industry and use herd immunity and information sharing to stop the spread of malware.
The Cloud Security Alliance's Software Defined Perimeter could be a valuable resource for health care providers trying to protect their clinical network.
In order to leverage the value of our data security solutions, we must address usability and translate actionable items at the business analyst level.
Recap of Bruce Schneier's Black Hat keynote, "The State of Incident Response," covering trends in the cyberworld and how threats should be addressed.
What sort of experience and skills does today's CISO — and the CISO of tomorrow — need to have? These skills are changing with the security landcape.
When selecting an Information Technology (IT) vendor, it is important to consider what the vendor does to mitigate security vulnerabilities.