Every CISO can relate to these bad security habits found in most organizations. But what can CISOs do to change them?
Annual security risk assessments and meaningful metrics are among the tools infosec pros can use when asking senior decision-makers to increase budgets.
We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.
Security shortcomings of third-party vendors are a cybercriminal's dream. So security pros should revisit how they manage vendor relationships.
Web application firewalls, an especially critical component of enterprise security, are even more effective when combined with other emerging security technologies.
Mobile commerce is a prime target for payment fraud, thanks to its novelty and complexity, according to a recent LexisNexis report.
Most IoT systems contain security vulnerabilities that can be exploited by hackers, a recent study found, highlighting the importance of developing secure IoT apps.
FireEye's Kevin Mandia has a few key questions for CISOs.
Why are information security risk assessments so important, and how can you make sure you get an effective assessment?
Anthem's recent data breach reveals some things Anthem did right – and some it did wrong. Other enterprises can learn from its actions.
In the wake of the Sony scandal, companies may wonder how long to retain email. Hint: The answer is not "forever."
Enterprises are finding business use cases for wearable technology, which means security teams must protect data on wearables and educate users about risks and best practices.
Determining costs of a data breach is a complicated, but important, exercise. It may help convince executives to increase security spending.
Business travelers are an attractive target for hackers. Here's how to protect yourself when you are on the road.
Intrusion detection systems can be a key tool in protecting data. This primer can help you determine which kind of IDS is right for you.
The key to smart security spending is assessing your current environment and looking for opportunities for centralization, consolidation and standardization.
When version 3.0 of the Payment Card Industry Data Security Standards becomes mandatory next month, merchants may need to make some changes.
Confidence that Tor can reliably provide users with anonymity on the Internet has been shattered, thanks to recent revelations. Tor alternatives do exist, however.
Recent social engineering attacks involving Dridex malware illustrate the importance of paying attention to older and infrequently used attack vectors.
Thorough documentation and clear communication can make dealing with a data breach a little less painful.
While identity and access management is a challenge for all organizations, especially global ones, panelists at the SC Congress event offered tips that can help.
Email is one of a hacker's favorite tools, so companies must be smart about thwarting email-generated cyber attacks.
To fight malware, security teams must understand it. Here are five especially nasty forms of malware.
As the Internet of Things proliferates, so too do IoT-based vulnerabilities and attacks. These three tips will help secure your IoT-enabled network.
The Shellshock flaw highlights a major security issue. Software created before mass adoption of the Internet is highly susceptible to today's security risks.
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Jul 2009
- Jun 2009
- May 2009
- Dec 2008
- Dec 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?