SECURITY

Subscribe
 

Protecting Your Brand in Cyberspace

With the growth in generic top-level domains, organizations will need to better protect their brand online from business competitors and cybercriminals.

Read More »

AETs: The Dirty Little Truth About Security

When it comes to security, every CIO experiences some level of angst and frustration. Despite growing investments in security, data breaches continue to regularly occur. A major reason is that digital miscreants of all types have access to advanced evasion techniques (AETs) which use a combination of evasion techniques, such as fragmentation and obfuscation, to bypass firewall and endpoint... Read More »

Nine Steps to Defeating the Heartbleed Bug

The Heartbleed bug is a newly discovered flaw in the OpenSSL cryptographic library, CVE-2014-0160, which affects encrypted communications between web applications, e-mail exchanges, instant messaging clients and some SSL-based virtual private network connections. Via Heartbleed, attackers can access the contents of a... Read More »

Inside the NIST Framework to Improve Cybersecurity

President Obama's Executive Order 13636, "Improving Critical Infrastructure Cybersecurity," issued a year ago, established U.S. policy for maintaining a cyber environment that encourages "efficiency, innovation, and economic prosperity while promoting safety, security, business confidentiality, privacy, and civil liberties." The Order calls for a voluntary, risk-based cybersecurity... Read More »

Assessing Current and Emerging Cyber-Threats

Security expert Steve Durbin discusses nation-state espionage and the dangers lurking in cyberspace, and urges organizations to become cyber resilient.

Read More »

Most CIOs Report 'A Major IT Transformation'

According to a survey by global consulting firm Protiviti, 63 percent of CIOs and IT professionals say "a major IT transformation" is happening in their organizations due to efforts to deliver added value, enhance business performance, and increased security. The Protiviti survey, "2014 IT Priorities Survey," also reveals that the roles of... Read More »

Cyber-Attacks: A Failure to Detect, Investigate

The failure to detect cyber-attacks and investigate them puts companies and their CISOs' jobs (and, of course, CIOs' jobs) at "significant risk," according to a new Ponemon Institute study. The report, "Threat Intelligence and Incident Response: A Study of U.S. and EMEA Organizations," was sponsored by Read More »

Employees: The Weakest Link in Security?

Employees represent a significant security risk, and organizations must take steps to educate them and protect systems and data.

Read More »

The Complicated Relationship Between CIOs and CSOs

Security expert Eric Cole discusses Target's gigantic data breach, a company's need for a CIO and CSO, and what CSOs wish CIOs understood about security.

Read More »

Enterprise Is the Main Target of DDoS Attacks

Distributed denial of service (DDoS) attacks plague the enterprise sector more than any other sector, including commerce, according to Akamai's just-released "Third Quarter, 2013 State of the Internet Report." Every quarter, Akamai releases such surveys, which include data gathered from across the company's Intelligent Platform about attack traffic, broadband adoption, mobile conductivity... Read More »

Read More From Our Security Archive »