February 23, 2015 Added by:Rebecca Herold
The costs of implementing security safeguards and privacy controls are significantly less than the costs, and damage to individuals’ lives, of cleaning up and paying all the associated money and time for security incidents and privacy breaches.
February 23, 2015 Added by:Alan Cohen
If enterprises want to counter cyberthreats, they need to both invest in APT and anti-malware technologies and improve their overall security posture.
February 20, 2015 Added by:Evelyn De Souza
As the public cloud becomes mission-critical, business and government applications, many standards bodies and government entities worldwide are issuing stronger security guidance and new standards.
February 19, 2015 Added by:Scott Fitzpatrick
It’s fascinating to watch the political climate being held sway with what are identified as “cyber terrorism” and “cyber war.” But it’s not the first time the Department of Defense has had to come to grips with a polemic decision that would require reengineering their entire fiscal architecture.
February 18, 2015 Added by:Joe Weiss
Just like the SCADA system affected during the 2003 Northeast Outage had known software issues, DC Metro was aware its computers and fan ventilation systems for dealing with smoke in tunnels needed to be modernized.
February 18, 2015 Added by:Robert McNutt
While no one has a crystal ball to peer in and see what 2015’s landscape will look like, one thing is for sure: hackers are becoming more sophisticated and in order to stave off data breaches, we need to be aggregating and sharing information.
February 17, 2015 Added by:Brian Prince
According to a survey of 1,000 consumers by ResearchNow, a third of the IT professionals and administrators said they had downloaded an application they were not authorized to use on a corporate device in order to do their job.
February 17, 2015 Added by:Tripwire Inc
Like any other major initiative, especially a new corporate wide initiative, you need the voice of the CEO.
February 17, 2015 Added by:Anthony M. Freed
ISACA has released a new guide for organizations concerned about the impact of The Internet of Everything (IOT) on business operations, addressing the potential value and the associated risks involved with expanded connectivity.
February 12, 2015 Added by:Brian Prince
In 2014, while several major companies were coping with breaches of their PoS infrastructure, many smaller retailers were facing the same threat from less-organized groups.
February 12, 2015 Added by:Mike Jawetz
If reactionary management of risk is inefficient and impulsive, why do most of us still do it?
February 12, 2015 Added by:Cyphort
It’s high time for us to work on adopting best security practices and start implementing a more effective posture.
SecurityWeek NCAA Bracket Challenge: Registe... aman mathur on 03-25-2015
Update 3: Hackers May Leak Norton Antivirus ... jhunax Astillero on 03-25-2015
Bridging the Cybersecurity Divide, Why Secur... suresh dwivedi on 03-25-2015