What is security's role in digital transformation?
With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organisation.
Stacy Collett | 17 Jan | Read more
With security regaining priority in digital strategies, CISOs are dispersing security responsibility throughout the organisation.
Stacy Collett | 17 Jan | Read more
Credit and payment card thieves are getting more sophisticated as chipped cards drive them to account takeover and card-not-present schemes.
Stacy Collett | 30 Aug | Read more
Cyber criminals are stepping up their attacks on mobile devices with new weapons and variations on old ones.
Stacy Collett | 01 Aug | Read more
Evolving ransomware and DDoS attacks, new technology such as IoT, and changing user behavior are all good reasons to revise your security policy.
Stacy Collett | 25 Jul | Read more
Publicly available data from government and other sources can help you find the right security talent.
Stacy Collett | 18 Jul | Read more
Organizations are missing opportunities to cultivate inside talent who may lack experience but already know the business and have the fundamental skills to succeed in cybersecurity.
Stacy Collett | 07 Jul | Read more
As Steve Martino approaches his 10-year anniversary as vice president and CISO at Cisco Systems, his job has morphed from treating security as simply a must-have to it becoming a strategic imperative for the company.
Stacy Collett | 30 May | Read more
Many veterans have the cybersecurity skills and attitude to be successful in the public sector with the right support.
Stacy Collett | 22 May | Read more
Organizations push for equitable and transparent credentials. Several credentialing initiatives are in the works to make cybersecurity credentials easier to understand and classify according to their value.
Stacy Collett | 03 May | Read more
LinkedIn and other social networks are becoming targets for threat actors since they know it's a great way to bypass company's defenses, according to cybersecurity firm Cylance. LinkedIn is typically a site that is not blocked by network filters to allow HR departments the freedom to communicate with prospective job candidates.
Stacy Collett | 25 Jan | Read more
Many security professionals feel less than certain about their own cyber defenses. Research firm CyberEdge Group and Tenable Network Security asked 700 security practitioners in nine countries and across seven industry verticals about their overall confidence that the world’s cyber defenses are meeting expectations.
Stacy Collett | 21 Dec | Read more
As its ‘bad guy’ stereotype wanes, hacker job postings in the enterprise jump 700% in three years.
Stacy Collett | 06 Dec | Read more
Who is responsible for preventing DDoS attacks involving IoT devices?
Stacy Collett | 26 Oct | Read more
This summer, online payment service giant Paypal learned that bad guys had set up a fake Paypal Support page on Twitter, and then monitored the real Paypal Support page for remarks from customers. The bad guys responded to those inquiries and pointed users to the fake site where they would ask for, and sometimes receive, personal and account information – an attack called angler phishing.
Stacy Collett | 03 Oct | Read more
You’ve trained them. You’ve deployed simulated phishing tests. You’ve reminded your employees countless times with posters and games and emails about avoiding phishing scams. Still, they keep falling for the same ploys they’ve been warned about for years. It’s enough to drive security teams to madness.
Stacy Collett | 21 Sep | Read more