Phil Britt - Article Archives - Page 1

Cybersecurity Risk Management: Finding and Fixing Your Security Vulnerabilities

March 30, 2017
Cybersecurity risk management can help you identify your biggest security vulnerabilities and apply the solutions that will keep you protected.
READ MORE

Point-of-Sale Security Still a Big Problem

October 11, 2016
Despite growing EMV adoption, hackers still see point-of-sale (POS) systems as low-hanging fruit.
READ MORE

Mac Malware Part of Worsening Security Picture

September 2, 2016
While Mac malware is not as big of a problem as attacks meant for Windows, hackers are targeting Apple operating systems more than ever before.
READ MORE

IoT Security Begins with Risk Assessment

May 9, 2016
Weigh benefits of IoT devices against potential security risks to determine on a device-by-device basis if the technology should be used, experts advise.
READ MORE

6 Tips for CISOs Selling Security to the Board

March 15, 2016
Some CISOs may dread presenting to the board of directors. These tips will help ensure it goes well.
READ MORE

10 Trickiest Mobile Security Threats

February 18, 2016
Mobile apps are popular with knowledge workers and hackers alike. Which 10 mobile security threats are the most problematic for security pros?
READ MORE

6 Cybersecurity Insights from SC Congress

December 28, 2015
Cyber insurance and new approaches to security patches were among topics on the agenda at the recent SC Congress.
READ MORE

Procuring Security Tech a Hassle? These 9 Tips Will Help

December 3, 2015
Procuring enterprise security technology can be tricky. A government CISO offers nine tips that will help the procurement process go smoothly.
READ MORE

6 Lessons Learned from Anthem Data Breach

November 5, 2015
Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.
READ MORE

Secure IoT from Outset, Experts Say

November 4, 2015
With use of connected devices on rise, enterprises must address IoT security issues from top down, experts say.
READ MORE

Apple vs. Android: Mobile Security Pros and Cons

August 31, 2015
Both Apple's iOS and Android have security strengths and weaknesses, experts say.
READ MORE

Can Sharing Threat Intelligence Prevent Cyberattacks?

August 19, 2015
The Obama administration and some in the private sector believe sharing threat information can help thwart cyberattacks. But not everyone is convinced.
READ MORE

Hackers Make Financial Services Firms Top Target

July 14, 2015
Hackers target financial services firms 300 percent more than companies in other verticals, says Websense Security Labs.
READ MORE

Phishing Attacks: Not Sophisticated, but Successful

March 31, 2015
While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.
READ MORE

Mobile Payment Fraud a Growing Problem: LexisNexis

March 2, 2015
Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.
READ MORE

Email Is Not Forever: Advice on Archiving

February 6, 2015
In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."
READ MORE

Dealing with a Data Breach: Tips from the Trenches

December 9, 2014
Thorough documentation and clear communication can make dealing with a data breach a little less painful.
READ MORE

SECURITY DAILY NEWSLETTER

GET SECURITY NEWS IN YOUR INBOX EVERY DAY
|