Please turn on your JavaScript for this page to function normally.
Plugging the trust gap

Every business and government is dependent upon cryptographic keys and certificates to provide trust for critical communications. These trust technologies underpin the modern …

Is it time to professionalize information security?

The issue of whether or not information security professionals should be licensed to practice has already been the topic of many a passionate debate. I think it is time to …

The CSO perspective on healthcare security and compliance

Randall Gamby is the CSO of the Medicaid Information Service Center of New York. In this interview he discusses healthcare security and compliance challenges and offers a …

The CSO perspective on risk management

Candy Alexander is the CSO at Long Term Care Partners and volunteers as a member of the International Board of Directors for ISSA. In the past, she was invited to the White …

A call to arms for infosec professionals

An old saying says “nature abhors a vacuum,” meaning that in the absence of something nature will find a way of filling that gap. We are currently witnessing the …

Security in a hyperconnected world

In this video, recorded at RSA Conference 2013, Qualys Chairman and CEO Philippe Courtot talks about the threats caused by intelligent devices as well as the changes required …

Hacker to business owner: Spotting innate talent in others

There has been much debate recently in the UK about the current GCSE exam format. On the one side are those that argue it should be scrapped in favour of a complex testing …

CSOs must adopt new risk management trends

Wisegate released new research from senior IT security members that shows how CSOs are adopting new risk management trends calling for a risk-based security approach. Security …

The SCADA security challenge

One of the less well-known aspects of information technology – but arguably one of the most critical to modern businesses – is the SCADA platform. SCADA stands for …

How CSOs are enabling secure BYOD

Wisegate released a new report that answers the industry’s most complex “Bring Your Own Device” (BYOD) questions while providing expert insight to help CSOs …

Privacy tips for social networking, apps and geolocation

Many people confuse data privacy and data security. While there are similarities, privacy and security are not the same thing. Data security focuses on the confidentiality, …

HD Moore: The wild west

HD Moore is the CSO of Rapid7 and Chief Architect of Metasploit. In the video below, recorded at Derbycon last week in Kentucky, he talks about ghost towns, highways, and …

Don't miss

Cybersecurity news