BYOD: The why and the how

Brad Keller and Robin Slade are Senior Vice Presidents at The Santa Fe Group. In this interview they talk in detail about the challenges involved in evaluating, deploying and …

Cybersecurity is a business imperative

While cybercrime threats are on the rise, current attempts to counter them remain largely unsuccessful. According to the 2013 State of Cybercrime Survey report, organizations …

Plugging the trust gap

Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …

The CSO perspective on risk management

Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

Security in a hyperconnected world

In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …

CSOs must adopt new risk management trends

Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …