Security Leadership - News, Features, and Slideshows

News

  • Channel growth a key focus for Webroot's new Asia-Pacific head

    A strengthened focus on channel partners and the capitalisation of recent technology acquisitions will fuel a redoubled assault on the Asia-Pacific endpoint security market as Webroot's newly appointed APAC regional managing director, Robbie Upcroft, settles into his new role as steward of an ever-harder battle against the growing tide of malware actors.

    David Braue | 06 May | Read more

  • Automation key to defeating new adversaries

    The Office of Personnel Management in the United States is responsible vast volumes of personal information. They’re responsible for the data relating to potential, current and past employees of the government. IT Security Operations Director Jeff Wagner is responsible for protecting this data against a constantly changing threat landscape. He’s taken a non-traditional approach to not only respond to threats in seconds with fewer resources, but also uncover previously hidden threats that were lurking on the network.

    Anthony Caruana | 22 Apr | Read more

  • The evolution of the CISO role and organizational readiness

    If we look at the headlines surrounding recent data breaches, we might conclude that the role of the chief information security officer (CISO) has never been more critical to the success and sustained well-being of an organization. As a by-product of this statement, we also might surmise that the information security organization and where it reports into is also important. This is probably why every recent CISO event includes a conversation about where the CISO and information security program should reside within an organization. The challenge is that however healthy the debate, the question about where the CISO and his/her department should report generally ends with, 'it depends'. To shift from a debate to productive action, maybe the question is not where should the CISO report into [<a

    By Brian Engle | 29 Oct | Read more

  • Pay up for talent? Is there a security salary disconnect?

    Demand for security talent has never been higher. Security spending, according to market research firm Gartner, is expected to grow nearly 8% this year. And few would argue that data breaches are under control. And yet, in our discussions with many security professionals throughout all levels of experience and expertise you often hear that enterprises are simply not willing to pay what is necessary for talent.

    George V. Hulme | 10 Sep | Read more

  • Security incidents tracked on Radar of Seattle Hospital

    Health care providers have become a ripe target for computer criminals in recent times which is making it difficult for the providers to manage their response to security incidents. That not only makes it difficult to protect patient data, but it puts providers at risk of financial sanctions from government regulators.

    John P. Mello | 19 Aug | Read more

  • Five CISO skills critical to your success in the next five years

    There's certainly no shortage of claims regarding the current shortfall of cybersecurity professionals. These findings show up repeatedly in our surveys, most recently the 2014 Global Information Security Survey and the 2013 State of the CSO, which both revealed that the demand for skilled IT security professionals continues to strain organizations' ability to fill security positions. Finding skilled information security workers was identified as one of the greatest challenges for 31 percent of large companies.

    George V. Hulme | 14 Aug | Read more

  • Can information sharing stop bots in their tracks?

    Bots are a bigger security problem than we think. Those of us who work in security are not unaccustomed to running into bots on the networks we monitor; in Check Point's 2014 Annual Security Report, released last month, our research found that 49 percent of organizations had seven or more bot-infected hosts.

    Kellman Meghu | 30 Jul | Read more

  • 6 steps to win executive support for security awareness programs

    In our article, "The 7 Elements of a successful awareness program," we identified the first and most critical element was obtaining C-level support. Such support is critical for the success of just about any organizational effort. Their support brings organizational buy-in and authority for your efforts. You can get other departments to support your efforts. While you will still meet some resistance, it is easier to overcome or bypass. Most importantly, you get more funding to put together a respectable awareness program.

    Ira Winkler and Samantha Manke | 22 Jul | Read more