Please turn on your JavaScript for this page to function normally.
Compliance misconceptions, challenges and tips

In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs …

Best practices for secure use of Windows XP

Microsoft’s support for Windows XP ended yesterday, April 8, 2014. However, Gartner estimates that one-third of enterprises currently have more than 10 percent of their …

A security advisor’s perspective on the threat landscape

In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he’s seen during his career, iOS vs. Android security, security awareness …

CISO challenges and security ROI

Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles …

Does IP convergence open you up to hackers?

Recent reports indicate that unauthorized persons gained access to Target’s network using credentials stolen from a company that worked on the company’s …

SIA Privacy Framework gets an update

The Security Industry Association (SIA) released the new SIA Privacy Framework to assist security companies with the development of privacy policies. SIA has updated its …

Panic! No malware required!

The landscape has shifted. Security is no longer something your organization can have complete control over. In this video, John Strand will demonstrate how most large …

Tips for improving your cyber security

With cyber threats around the globe evolving and becoming more sophisticated, evidenced by the recent data breach at retailer Target, it is important that consumers protect …

Simple steps to prevent data theft

HID Global offered four tips for protecting organizations against the types of data breaches that recently occurred at major retailers. An effective defense against the …

Five tips to reduce identity theft

Some Americans submitting their taxes this year will make the unpleasant discovery that someone else has already filed and stolen their refunds. Tax fraud claimed 1.2 million …

Mobile data leakage

Attack vectors in the mobile world are related to apps, content and web. In this podcast recorded at RSA Conference 2014, Mike Raggo, Security Evangelist at MobileIron, …

Eight cyber security tips I learned from The Walking Dead

Sometimes two things that don’t seem to go together, make the most magical combinations. This article is the first in a new series of security articles I’ll be …

Don't miss

Cybersecurity news
Daily newsletter sent Monday-Friday
Weekly newsletter sent on Mondays
Editor's choice newsletter sent twice a month
Periodical newsletter released when there is breaking news
Weekly newsletter listing new cybersecurity job positions
Monthly newsletter focusing on open source cybersecurity tools