Please turn on your JavaScript for this page to function normally.
Which kind of security professional are you?

Much has been said and written about the arrogance prevalent in the computer industry, especially that of gamers and security professionals. A well-known female gamer recently …

IT professional, hack thyself

To anyone not living under a rock, the increasing threat of a cyber attack is very plain. IT professionals spend sleepless nights worrying that they’ll be the next …

How a penetration test helps you meet PCI compliance guidelines

In order to protect credit card data, sometimes businesses have to think like a hacker. Every year, merchants who transmit, process, or store payment card data must conduct a …

What infosec can learn from the Greek elections

Sometimes disruption just happens. It occurs when something creates a dramatic change of direction, and examples are all around us: the introduction of the GUI, the iPod and …

Overcoming the daily challenges of a security team

The constantly evolving cyber threat landscape is resulting in new challenges and approaches for today’s security analyst teams. In the past, companies looked at the …

Do government initiatives increase security awareness?

New research, by SecureData and Vanson Bourne, investigated the impact government security initiatives had on end-user organizations in 2014, with nearly half (47%) reporting …

What IT workplace issues keep CIOs awake at night?

What worries chief information officers (CIOs) and IT professionals the most? According to a recent survey by Sungard AS, downtime and talent acquisition weigh heaviest on …

Guidance to improve risk management and IoT

As connected devices infiltrate the workplace—some with IT’s knowledge and some without—both value and risk can increase significantly. ISACA has released new guidance …

Infosec management strategies and the modern CTO

Lumenta recently appointed Brandon Hoffman as their new CTO. We took this opportunity to get his perspective on the management strategies that are essential in the information …

Cybersecurity readiness: Widening gulf between perception and reality

Attackers have become more proficient at taking advantage of gaps in security to evade detection and conceal malicious activity, according to Cisco. Defenders, namely, …

How to prepare if you’re selected for an OCR audit

The forthcoming Office of Civil Rights (OCR) audits for HIPAA compliance have seen some delays this fall – but that doesn’t mean covered organizations can delay …

Five key security, identity and access management trends

CA Technologies announced five key trends for security and identity and access management (IAM) that will impact organizations and security professionals in 2015 as they …

Don't miss

Cybersecurity news