SECURITY

Subscribe
 

Three Things CIOs Should Know About Cyber-Security

CIOs need to be aware of bring your own everything and cloud trends in the workplace, new privacy and data breach regulations, and evolving security threats.

Read More »

What to do When a Data Breach Occurs

Data breaches are inevitable these days, which is why having a well-defined incident response plan and team in place is a necessity.

Read More »

How a Security Company Zapped Zombie Zero

A security company has discovered Chinese malware, called Zombie Zero, which attacks shipping companies through handheld scanners used to track shipped inventory. The malware has hit a large manufacturing company as well as seven customers that use handheld scanners. The security company that made the Zombie Zero discovery is TrapX, formerly... Read More »

12 Things You Should Know About Cyber-Defenses

Virtually all IT organizations experienced a significant IT security incident in 2013 and most of them know some of their security measures are immature or ineffective, but only one-third are confident their less-mature security controls will soon improve. These findings are from a new report, "2014 Cyber Defense Maturity Report," from Read More »

Why Your Heartbleed Patch Isn't Enough

Many Global 2000 organizations haven't adequately protected their external servers against the Heartbleed bug, leaving themselves vulnerable to phishing campaigns and data theft.

Read More »

What You Need to Know About Digital Risk Officers

The role of digital risk officer (DRO)—to manage risk for all forms of digital technologies—is rapidly evolving. The reason for this development is that the traditional concept of IT security is insufficient, according to Gartner's 2014 CEO survey. DROs will combine business acumen with technical and security knowledge and will need new skills beyond those typically required of... Read More »

Are Your Virtual Servers Safe?

The odds of a virtual environment being inadequately unprotected are roughly fifty-fifty, as many organizations only partly implement a security solution.

Read More »

Missing in Action: BYOD Security

Despite the prevalence of BYOD in the enterprise, many organizations act as if mobile device security is optional. Ditto for employee security training.

Read More »

Eight Ways to Improve Your Cyber-Security Spending

Organizations are concerned about cyber-threats, but many of them have neither invested strategically in security nor aligned that spending with their business strategies, according to a new report. One result is a major gap in security spending between industries. For instance, banking and finance spending heavily ($2,500 median per employee) while others, like retail and consumer products... Read More »

Why Security Awareness Programs Fail

Organizations need to shift from promoting awareness of potential problems to embedding security habits that create a "stop and think" behavior—and affect risk positively.

Read More »

Read More From Our Security Archive »