The federal government recently got its report card for cybersecurity, and it wasn't a pretty picture. What can corporate IT professionals learn from the feds' mistakes?
eSecurityPlanet Columnist Penny Klein says it's up to Information Assurance veterans to help newcomers to the field. It's the best way to assure quality work.
A rose is a rose, right? Actually, it might not be. Columnist Penny Klein says too many terms have differing definitions. And that's not helping anybody. It's time to standardize.
Columnist Penny Klein takes a look at the past year -- what we did right and what we need to do better as we move into 2006.
Columnist Penny Klein says IT administrators are not stepping up to the plate and implementing Continuity of Operations plans. And it could cost the business.
Columnist Penny Klein says there are three key areas to information assurance. If your company isn't focused on all three, you're not really secured.
eSecurityPlanet columnist Penny Klein says some IT types got bitten by a bug recently -- and all because they didn't follow their own rules. It's time, she says, to get back to basics.
Columnist Penny Klein walks her parents -- and the rest of us -- through a security session.
A pretty young woman offers a bright smile and talks about the cafeteria food as she follows an IT worker into the computer lab. But her only job there is to steal critical information.
eSecurityPlanet Columnist Penny Klein takes a look at working out a continuity plan to keep your business running despite disaster.
Getting people to remember their security responsibilities can be a challenge. But it's worth the effort.
Everyone is talking about identity theft, but columnist Penny Klein says the problem is that few people are guarding against it. Here are some smart steps to take.
Many security guidelines are expected to be published this year, and our new columnist, Penny Klein, walks you through a few that should make security management that much easier.
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?