The Building Security in Maturity Model's sixth edition features recommendations gleaned from software security practices of more than 100 companies.
Four simple steps can help organizations secure business data outside the firewall.
Two serious bugs later, almost no one thinks it is a good idea to use TrueCrypt. But what are your options?
PINs, patterns and fingerprints are all options for unlocking mobile devices. But which option is most secure?
Europe's data protection rules are about to get more strict, under legislation being drafted by the European Commission. Several rules relate to cloud data.
With the Apple Watch, as with smartphones before it, security pros need to proactively prepare for the mobile device's entry into the workplace.
"Zombie" apps are an often overlooked BYOD security threat. User education and application whitelisting can reduce risks associated with these dead and stale apps.
Reduce the likelihood of having your mobile device hacked by using two-factor authentication.
As recent data breaches show, every organization needs to take action to better secure insider access, particularly that of privileged users and contractors.
Picking the right tool is a critical part of application security.
Vendor application security testing is a key practice to help companies ensure that third-party software meets their security standards.
Attaining PCI-DSS compliance is no easy task, but IKEA's common sense approach makes it a bit less taxing.
What can Bruce Lee teach your security team about dealing with cyber threats?
Doggedly pursuing security best practices will help organizations beat vulnerabilities like POODLE.
Targeting enterprise databases is a common attack tactic, as the Anthem breach showed, yet many companies neglect database security.
It can be tough to know where to go for the latest enterprise security news and actionable advice. This list of influencers is a great place to start.
Windows 10 includes some goodies for enterprise security professionals.
Application security should never be an afterthought. SoftServe's Nazar Tymoshyk offers advice on building secure software.
Even folks who know better can fall for sophisticated phone scams that leverage personal information.
What are your options, if any, for mitigating security risks of continuing to run Windows Server 2003 after Microsoft ends extended support in July?
Following data security best practice may give you a false sense of security and leave you vulnerable to potential attacks, says Absolute Software's Ryan St. Hilaire.
While companies spend big bucks on combating advanced malware, users still fall prey to email phishing scams.
Every CISO can relate to these bad security habits found in most organizations. But what can CISOs do to change them?
Annual security risk assessments and meaningful metrics are among the tools infosec pros can use when asking senior decision-makers to increase budgets.
We include a list of vendors that offer solutions that can help improve your response to security threats and data breaches.
- Nov 2015
- Oct 2015
- Sep 2015
- Aug 2015
- Jul 2015
- Jun 2015
- May 2015
- Apr 2015
- Mar 2015
- Feb 2015
- Jan 2015
- Dec 2014
- Nov 2014
- Oct 2014
- Sep 2014
- Aug 2014
- Jul 2014
- Jun 2014
- May 2014
- Apr 2014
- Mar 2014
- Feb 2014
- Jan 2014
- Dec 2013
- Nov 2013
- Oct 2013
- Sep 2013
- Aug 2013
- Jul 2013
- Jun 2013
- May 2013
- Apr 2013
- Mar 2013
- Feb 2013
- Jan 2013
- Dec 2012
- Nov 2012
- Oct 2012
- Aug 2012
- Jul 2012
- Jun 2012
- May 2012
- Apr 2012
- Mar 2012
- Feb 2012
- Nov 2011
- Oct 2011
- Sep 2011
- Aug 2011
- Jul 2011
- Jun 2011
- May 2011
- Apr 2011
- Mar 2011
- Feb 2011
- Jan 2011
- Dec 2010
- Nov 2010
- Oct 2010
- Aug 2010
- Jul 2010
- Jun 2010
- May 2010
- Apr 2010
- Mar 2010
- Feb 2010
- Jan 2010
- Dec 2009
- Jul 2009
- Jun 2009
- May 2009
- Dec 2008
- Dec 2007
- What are the top Android security apps?
- What are the top Android security risks?
- What are today's top cyber threats?
- What's the most secure way to delete data?
- How does hard drive encryption work?
- Is old software inherently insecure?
- Are Macs immune to malware?
- How can BYOD risk be managed?
- Which web browser is the most secure?
- How do I protect my iOS device?
- What are the top iPhone security apps?
- How do I secure my wireless network?
- Are public Wi-Fi hotspots safe?