Please turn on your JavaScript for this page to function normally.
Targeting security weaknesses in the phone channel

Fraud over the phone channel is a significant problem for businesses, both small and large. Recently, phone hackers targeted a small architecture firm in Georgia, costing them …

The impact of disconnected security strategies

39% of organizations’ IT departments are spending too much time managing their security network and manually tackling threats, according to McAfee. Almost a third of IT …

Integrating IT security at the board level

2014 has seen an upsurge in public awareness of cybercrime, with a flurry of high-profile security breaches hitting the headlines. The sensationalised coverage of the …

CISOs troubled by complex issues

Although nearly one-half (48 percent) of all state CISOs reported incremental increases to cyber security budgets, insufficient funding remains the leading barrier to battling …

The harsh realities of protecting businesses

Ninety percent of CIOs and CTOs believe the job of keeping their enterprise protected is becoming more challenging according to new research from Fortinet. Serious boardroom …

Board practices regarding IT oversight and cybersecurity

Greater director involvement in social media oversight, concern about the Department of Homeland Security/NIST cybersecurity frameworks and increased use of IT consultants are …

Every budget is now an IT budget

IT is more and more a key component of all business initiatives and is becoming an important part of those budgets, according to Gartner, Inc. CIOs must work with business …

Internet of Things to make CISOs redefine security efforts

By year-end 2017, over 20 percent of enterprises will have digital security services devoted to protecting business initiatives using devices and services in the Internet of …

Big Data is big noise

Big Data was supposed to be the solution to all our security problems, but this spotlight on intruders turned out to be a mess of white noise. Hiding comfortably in that …

IT security is a matter of accountability

For today’s CEO, being the victim of criminal hackers is no longer just a source of embarrassment. Being hacked often carries legal ramifications and can even cost you …

5 things infosec can learn from adventure games

As an active adventure gamer and a natural seeker of reusable patterns, I’ve noticed that some of the things I do to achieve success in video games can be applied to …

Securing the U.S. electrical grid

The Center for the Study of the Presidency & Congress (CSPC) launched a project to bring together representatives from the Executive Branch, Congress, and the private …

Don't miss

Cybersecurity news