Articles by Phil Britt 

Point-of-Sale Security Still a Big Problem

Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.

Mac Malware Part of Worsening Security Picture

While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.

IoT Security Begins with Risk Assessment

Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.

6 Tips for CISOs Selling Security to the Board

Some CISOs may dread presenting to the board of directors. These tips will help ensure it goes well.

10 Trickiest Mobile Security Threats

Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile security threats are the most problematic for security pros?

6 Cybersecurity Insights from SC Congress

Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.

Procuring Security Tech a Hassle? These 9 Tips Will Help

Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.

6 Lessons Learned from Anthem Data Breach

Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.

Secure IoT from Outset, Experts Say

With use of connected devices on rise, enterprises must address IoT security issues from top down, experts say.

Apple vs. Android: Mobile Security Pros and Cons

Both Apple's iOS and Android have security strengths and weaknesses, experts say.

Can Sharing Threat Intelligence Prevent Cyberattacks?

The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.

Hackers Make Financial Services Firms Top Target

Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.

Phishing Attacks: Not Sophisticated, but Successful

While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.

Mobile Payment Fraud a Growing Problem: LexisNexis

Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.

Email Is Not Forever: Advice on Archiving

In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."

Dealing with a Data Breach: Tips from the Trenches

Thorough documentation and clear communication can make dealing with a data breach a little less painful.

IAM Best Practices: Involve HR, Use Single Sign-on

While identity and access management is a challenge for all organizations, especially global ones, panelists at the SC Congress event offered tips that can help.