CISO August 12, 2016 A Risk-Driven Approach to Security, From Check Boxes to Risk Management Frameworks 4 min read - Department heads have to start thinking about risk management in terms of acceptable risk levels, not compliance requirements to mark off a checklist.
Application Security May 4, 2016 How to Make the Most of Your Pen Test 4 min read - A pen test can be tremendously valuable for your team and organization, but you have to know how to glean the key lessons from the experience.
Advanced Threats April 29, 2016 A Future Full of Drones — and the Advanced Threats They Present 5 min read - Drones may be a relatively new technology, but there are a number of established risks and threats that need to be addressed by all organizations.
April 5, 2016 New Block Ciphers From NIST Add Tweaks to Credit Card Information 2 min read - The National Institute of Standards and Technology (NIST) announced two block cipher algorithms that will preserve data formatting in secure POS systems.
Data Protection February 12, 2016 Who Needs to Know? Fine-Grained Access Control Can Protect Data Privacy 3 min read - Fine-grained access controls such as the ones included in IBM Guardium products may be just the thing needed to enhance data privacy.
Application Security December 15, 2015 Testing Your SSL Encryption Can Provide Important Security Insights 3 min read - New, free SSL encryption tests can show areas for improvement with regard to email protection and the best practices for maintaining application security.
Endpoint November 19, 2015 Simple Mobile Security Steps to Protect Health Information 3 min read - Mobile security strategies must be upgraded in order to keep protected health information secure across all access points and endpoints.
Software Vulnerabilities November 18, 2015 A SHA-1 Certificate Will Fail Soon 2 min read - The SHA-1 certificate is still widely used, but it poses a number of cybersecurity issues and will likely cause a major problem soon.
November 6, 2015 Search for Cybersecurity Professionals Fires Up With New NIST Heat Map 2 min read - Cybersecurity professionals looking for work can help fire up their job search with NIST's new heat map tool, which helps identify open positions.
Intelligence & Analytics October 23, 2015 Key Innovators Honored by the Cybersecurity Hall of Fame 2 min read - Take a look at the five innovators joining the Cybersecurity Hall of Fame this year, along with some of their significant contributions to the field.