Some of the world’s largest corporations have recently fallen victim to hacking attacks and identify data theft, while other online businesses have been compromised and sidelined for days or weeks, losing millions of dollars in revenue and suffering significant reputational damage. It’s never been more important for companies to act in order to avoid becoming the next victim of identity data theft.
Anton Koren |
14 Jul |
Read more
Recent attacks on HB Gary and RSA are evidence of Bruce Schneiers recent comment that “attacking a network is much easier than defending a network” and that “there might someday be the cyberspace equivalent of trench warfare, where the defender has the natural advantage”.
CSO staff |
13 Jul |
Read more
The WildList is a compilation of sample viruses that have been submitted by security professionals from around the world. It is published each month to a select group of subscribers. Contributors can be any security professional, but the sample must be submitted by at least two respected sources before it will be included in the list.
Ian Hyndman |
13 Jul |
Read more
This is not just what is stolen; but also the loss of business or credibility that comes from informing customers that their data has been compromised. How would your customers react if you told them that their financial data or personal information had been taken by persons unknown?
Ian Hyndman |
13 Jul |
Read more
In the data center today, several major trends are happening in parallel, with each representing a fundamental change in terms of how IT is managed. For the security teams responsible for safeguarding corporate IT assets, these trends present a host of challenges, necessitating several new capabilities and approaches to ensure ongoing, effective security.
Greg Bunt |
11 Jul |
Read more
Most modern day cyber attacks tend to target organisations and governments with the explicit purpose of stealing information and causing disruption. As a consequence, governments have had to reassess their stance on cyber crime, and many are attempting to tackle the problem directly.
Ian Hyndman |
11 Jul |
Read more
Application security is currently one of the major battlegrounds in information security. Compromised web applications are ransacked for credit card numbers, personally identifiable information and is a major vector for spreading crimeware enabling criminals to defraud our banking institutions
Matthew Hackling |
11 Jul |
Read more
If we were to believe the marketing hype over the last 20 years, we should be in a position today, in 2011 where security is not the BIG problem that it is. Every “security” product has promised to take the pain away; make us secure, compliant (with every known standard), and to not only solve our problem today, but to future proof us also. Buy now and you need nothing else!
Drazen Drazic |
08 Jul |
Read more
Your board and audit committee are looking for reduction in risk exposure driven by your information security policy. Is this something you can track and measure?
Mark Ames |
08 Jul |
Read more