There are many factors to consider when making an application security purchasing decision, and the pressure is on organizations now more than ever to improve their security risk management...
Read moreVery few organizations have fully incorporated all relevant risks and threats into their current digital strategy, research finds. Today, all organizations are digital by default. However, it has never...
Read more10 ways CSOs can achieve ROI on a network solution
June 15 2018With the advent of Bring Your Own Device (BYOD), WLAN network access to customers and visitors and virtualized systems, the demand for IP addresses has exploded. Small companies might have to...
Read moreNew European Parliament document calls out Kaspersky Lab software as ‘malicious’ and says it should be banned. Kaspersky Lab, in response to a resolution adopted by the European Parliament...
Read moreHow can CSOs protect their CEO?
June 15 2018A key component of being an executive is traveling (including visiting customers and attending conferences). Wireless networks, especially free ones, are prone to being spoofed as well as fake...
Read moreModerate severity Lazy FP restore flaw affects Intel Core-based microprocessors. Intel has disclosed another speculative execution side-channel vulnerability affecting many of its modern microprocessors that gives attackers a way...
Read moreBrowse With Encryption
June 15 2018What Is Encryption? You may hear people use the term “encryption” and how you should use it to protect yourself and your information. However, encryption can be confusing and...
Read moreHow to strike ransomware out
June 15 2018Most businesses are ill prepared to handle a ransomware attack. In fact, according to a new study released by Carbonite, 68 percent of survey respondents believe their company is “very vulnerable”...
Read moreDemystifying Mental Health in the Infosec Community
June 15 2018Security experts talk about burnout, diversity, mental health, and legal issues in a new Community track at Black Hat USA. Security experts at different companies find common ground in...
Read morePitfalls of identity access management
June 14 2018Project-oriented thinking leads to shortchanging IAM. You avoid this by beginning with a multi-year plan that breaks up costs into implementation and operational stages. Forecast the number of people...
Read more
Recent Comments