The Latest News

  • Selling InfoSec Careers to Women

    Communication, Education, Research Skills All in Demand Selling InfoSec Careers to Women
    Security researcher Lysa Myers

    To entice more women, as well as men, to enter information security professions, researcher Lysa Myers says the industry needs to kill its boring image and better communicate the full array of opportunities available and the skills that are in demand. Read more...

  • Threat Intelligence in Right Context

    FireEye's Costanzo Calls for 'Re-Imagining' Security Threat Intelligence in Right Context
    Rich Costanzo, Technical Director - FireEye

    With growing vulnerabilities and changing cyberthreats, CISOs must leverage threat intelligence models to gauge attackers' motives, says FireEye's Rich Costanzo, who calls on CISOs to "re-imagine" security. Read more...

  • Application Security: 5 Must-Haves

    OWASP's Soi on Securing the Application Lifecycle Application Security: 5 Must-Haves
    Dhruv Soi, founder Torrid Networks (P) Ltd., and chairperson OWASP India.

    In an application-driven economy, are security leaders paying enough attention to application-level security? OWASP's Dhruv Soi speaks on how to ensure security in the application development lifecycle. Read more...

  • 'Failure-Proof' Mobile Security

    Gartner's Girard on Key Security Challenges in Mobility 'Failure-Proof' Mobile Security
    John Girard, Senior Vice President and Distinguished Analyst, Gartner

    Gartner's John Girard boils down the mobile security challenge to three topics: the number of devices, diversity of capabilities and the complexity of management. How does he advise CISOs to tackle these challenges? Read more...

  • Articulating Security's Business Value

    Gartner's Scholtz on How to Educate Management Articulating Security's Business Value
    Tom Scholtz of Gartner

    When security succeeds, it is often unnoticed. That success might also make security investments hard to sustain, given its low profile in organizations. Gartner's Tom Scholtz discusses articulating security's business value. Read more...

  • Article

    Banking's New Channels, Threats

    Cisco's Srinivasan on the Evolving Threat Landscape for Banks By Varun Haran
    Banking's New Channels, Threats

    Banking is no longer just about bricks-and-mortar. With institutions increasingly adopting Web and mobile banking, the threat landscape is changing. Cisco's Pravin Srinivasan shares insight for practitioners.

  • Blog

    The Internet of Buggy Things

    It's Time to Patch or Pitch Vulnerable Devices By Mathew Schwartz
    The Internet of Buggy Things

    It's no surprise that virus-wielding hackers are exploiting Internet of Things devices. Blame too many device manufacturers rushing products to market, skimping on secure development practices and failing to audit the third-party code they use.

  • Article

    Logjam Vulnerability: 5 Key Issues

    Don't Rush to Fix 20-Year-Old Flaw, Experts Say By Mathew J. Schwartz
    Logjam Vulnerability: 5 Key Issues

    While the "Logjam" vulnerability raises serious concerns, there's no need to rush related patches into place, according to several information security experts. Learn the key issues, and how organizations must respond

  • Article

    Feds Charge Chinese with Insider Theft

    DoJ: Secrets from U.S. Firms Used to Start Up a Chinese Venture By Eric Chabrow
    Feds Charge Chinese with Insider Theft

    Federal authorities have arrested a Chinese professor, accusing him of pilfering trade secrets from the computer systems of American high-tech companies where he and a co-conspirator once worked.

  • Interview

    The Evolution of Security Technology

    Juniper's Paul on What 'Layered Security' Really Means By Varun Haran
    The Evolution of Security Technology

    As security threats have evolved, organizations have deployed layers of security controls. How can leaders address the vulnerabilities within these incremental controls? Juniper's Paul shares insight.

More news...

Webinars

More webinars...

White Papers

More whitepapers...
ARTICLE Infographic: Are You a Breach Victim?

Has your personal information been compromised in a data breach this year? This infographic...

Latest Tweets and Mentions

ARTICLE Infographic: Are You a Breach Victim?

Has your personal information been compromised in a data breach this year? This infographic...