Opinion
Opinion
-
How intelligence data leaks caused collateral damage for infosec
Alvaka Networks' Kevin McDonald looks at the real-world damage caused by data leaks at the CIA and NSA, which have put dangerous government cyberweapons in the hands of hackers Continue Reading
-
Wendy Nather: 'We're on a trajectory for profound change'
This former CISO talks about her uncharted path from international banking to industry analysis. What's next for infosec? We ask the security strategist those questions and more. Continue Reading
-
Spotting a system breach takes defensive and offensive strategies
A system breach is inevitable, and BDS products provide a valuable means of detection. But a strategy that blends both defense and offense is the best approach to security. Continue Reading
-
Q&A: GDPR compliance with Microsoft CPO Brendon Lynch
Failure to achieve compliance with the EU's General Data Protection Regulation in the next 12 months can trigger fines of up to 4% of a company's gross annual revenue. Continue Reading
-
CISO job requires proven track record in business and security
In the security field, certifications and degrees are never a substitute for on-the-job experience. For women in security, the challenges may be even greater. Continue Reading
-
Start redrawing your identity and access management roadmap
Securing enterprise systems and information requires an IAM roadmap that helps you identify effective policy, technology and tools. Continue Reading
-
Chenxi Wang discusses DEF CON hacking conference, 'Equal Respect'
Grassroots efforts to shift cultural thinking in information security have had a positive effect, the former professor of computer engineering says. Continue Reading
-
Outsourcing security services rises as MSSPs focus on industries
Despite increasing levels of specialization, managed security service providers often don't understand the business you're in. That may be changing. Continue Reading
-
Tool time: Picking DDoS prevention products
DDoS prevention is an urgent security need for any company. Learn how to select the products and services that will best strengthen your defense against denial-of-service attacks. Continue Reading
-
The best SSO for enterprises must be cloud and mobile capable
The best SSO today can handle the apps mobile workers use, identity as a service and more. Learn to make single sign-on, and other identity management approaches, more effective. Continue Reading
-
AI or not, machine learning in cybersecurity advances
As more companies promote machine learning and artificial intelligence technologies, chief information security officers need to ask some tough questions to get past the hype. Continue Reading
-
Q&A: IBM's Diana Kelley got an early start in IT, security came later
How did an editor become a security architect? A fascination with computers sparked a lifelong journey for IBM's executive security advisor. Continue Reading
-
Strength in numbers: Threat intelligence tools can't go it alone
Threat intelligence tools are a phenomenal addition to your security posture; they just can't be your security posture. Learn where they fit into your security scheme. Continue Reading
-
Uncharted path to IT and compliance with Digital River's Dyann Bradbury
Bradbury chats with Marcus J. Ranum about her early interest in computers and her unexpected career path to head of global compliance for an e-commerce provider. Continue Reading
-
Tackle IT threats that originate inside your company
IT threats are tough to tackle when they originate from within your business. This technical guide considers that issue and offers ways to deal with insider security threats. Continue Reading