Passwords: Real-world issues, tips and alternatives
Per Thorsheim is an independent information security adviser based in Norway. He is the founder and main organizer of PasswordsCon, the first and only international conference …
Working to accomplish compliance and security
Organizations have until January 2015 to meet the new requirements of the PCI Data Security Standard version 3.0. Businesses need to ensure that compliance is cyclical and …
Learning from others
The old saying “one man’s misfortune is another man’s gain” is eminently applicable in the information security industry. When an organization becomes …
How can we create a culture of secure behavior?
It’s a busy day in your company and everyone is rushing around trying to respond to requests. Audrey gets an email that looks like it’s from a partner asking her …
Identifying security innovation strategies
Tom Quillin is the Director of Cyber Security Technology and Initiatives at Intel Corporation. In this interview he talks about security innovation, current and future …
Securing mobile applications
In this interview, Dan Cornell, Principal of Denim Group, talks about the most common pitfalls of securing mobile applications, discusses the challenges involved in performing …
Compliance misconceptions, challenges and tips
In this interview, Paul Koziarz, President and General Manager of Regulatory Compliance at CSI, talks about the misconceptions related to compliance, provides advice for CSOs …
Best practices for secure use of Windows XP
Microsoft’s support for Windows XP ended yesterday, April 8, 2014. However, Gartner estimates that one-third of enterprises currently have more than 10 percent of their …
A security advisor’s perspective on the threat landscape
In this interview, Sean Sullivan, the Security Advisor at F-Secure Labs, talks about threats he’s seen during his career, iOS vs. Android security, security awareness …
CISO challenges and security ROI
Mark Brown is the Director of Information Security at EY. In this interview he offers guidance for CISOs, discusses the technical competence of company leaders, tackles …
Does IP convergence open you up to hackers?
Recent reports indicate that unauthorized persons gained access to Target’s network using credentials stolen from a company that worked on the company’s …
SIA Privacy Framework gets an update
The Security Industry Association (SIA) released the new SIA Privacy Framework to assist security companies with the development of privacy policies. SIA has updated its …
Featured news
Resources
Don't miss
- Critical Control Web Panel vulnerability is actively exploited (CVE-2025-48703)
- 18 arrested in €300 million global credit card fraud scheme
- PortGPT: How researchers taught an AI to backport security patches automatically
- AI can flag the risk, but only humans can close the loop
- VulnRisk: Open-source vulnerability risk assessment platform