Please turn on your JavaScript for this page to function normally.
How the cloud can be used and misused

Peter Jopling, CTO and Software Security Executive, IBM UK & Ireland, talks about threats to cloud infrastructure providers, the importance of real-time data analytics, …

Breakdown of traditional security models and strategies

Increasing adoption of a more mobile, social, data-driven and consumer-like workplace is causing the breakdown of traditional security models and strategies, according to …

Big Data needs a data-centric security focus

CISOs should not treat big data security in isolation, but require policies that encompass all data silos if they are to avoid security chaos, according to Gartner, Inc. …

Are you prepared to manage a security incident?

It’s the year of the breach. Adobe, Target and eBay fell victim to cyber-attacks and 2014 has already seen the Heartbleed bug impact the majority of organizations across …

What are the top security concerns of senior IT executives?

Most C-level executives would agree that protecting a company’s confidential data and trade secrets from the prying eyes of competitors is critical. Yet interactive …

Opportunities and challenges for CIOs in different industries

CIOs around the globe may share common concerns, but there are considerable differences in their priorities, according to a global survey of CIOs by Gartner, Inc.’s …

Healthcare industry lags in security effectiveness

BitSight analyzed Security Ratings for S&P 500 companies in four industries – finance, utilities, retail and healthcare and pharmaceuticals. The objective was to …

Strategic security acquisitions: What makes sense?

Thanks to a steady stream of high-profile data breaches, a rapidly shifting threat environment, and the recent indictment of 5 members of Chinese People’s Liberation …

Risk management issues, challenges and tips

Gary Alterson is the Senior Director, Risk and Advisory Services at Neohapsis. In this interview he discusses the most significant issues in risk management today, offers tips …

Trust in the U.S. cloud on the decline

Perspecsys revealed a continental cloud divide between the U.S. and Europe, based on data findings from a study it conducted at Infosecurity Europe 2014. Perspecsys surveyed …

Company and employee disconnect on BYOD security policies

Many employees do not take adequate steps to protect company information, a weakness that could result in critical security breakdowns, according to Webroot. Key findings: …

Most compliance officers play little role in cyber security

Seventy-five percent of compliance officers are not involved in managing cyber security risk according to a report from Kroll and Compliance Week. In a survey of senior-level …

Don't miss

Cybersecurity news