Don’t let embarrassment about a data breach cost you even more
Cyberthieves prey on human nature for even more profit.
Cyberthieves prey on human nature for even more profit.
The company has sanctioned the use of an online password vault, so why is there a spreadsheet making the rounds that contains scores of passwords to servers that contain sensitive data?
Is the government desperate, feigning desperation or just staggeringly inept?
With the IoT, we desperately need a common vision of a tomorrow and a critical mass of folks to believe enough to make happen, writes columnist Rob Enderle.
The IoT market is being hyped for a second time. But perseverance is a virtue. The pieces of the puzzle are very slowly falling in place.
Security industry prognosticators rely more on marketing, hype, and our own bad memories than any knowledge of security past, present or future.
Columnist Rob Enderle describes 2015 as yet another year when stupid decisions were the norm. He would like to see folks finally learning from their mistakes, but he won’t be holding his breath.
Top editors from enterprise IT brands Computerworld, Network World, CIO.com and CSO offer up their predictions for things that will happen in IT in 2016.
For our security manager, the two big issues are the browsers his users employ, and the versions supported by the corporate website.
As mobile and consumer technology alters our lives, new coinages bubble up in the social networks to capture and express how people live. Here are 10 new words you need to know in order to describe the culture of Silicon Valley as well as the culture changes the valley is bringing into existence.
That’s what hackers are — they should be feared, but our fears are completely out of proportion.
Famous shipwreck holds many lessons for the cybersecurity community
Oracle Chief Security Officer Mary Ann Davidson let loose a long rant about people who dare to look into the security of the company’s products. Oracle quickly backed away from those remarks, but has it faced up to the fact that its CSO has some wrongheaded notions about her own area of expertise?
Shadow IT brings many security issues, but since these systems are not on IT's radar, they do not get factored into overall risk management strategy. Here are some practical suggestions.
Reflecting on the insights and discussions of the Leading Security Change series reveals a clear benefit of moving to the cloud that improves security for everyone
We bought a next-generation firewall, as I had hoped we would. The real trick, though, was getting the IT department to take full advantage of all of its advanced functionality.
Don’t laugh. Names like 'cyber hygiene' and 'cyber palette' describe some very serious concepts.
Ages ago the dinosaurs roamed the earth. All evidence demonstrates that they met with an untimely end. Much in the same vein, I firmly believe that Adobe's Flash has reached it's own extinction level event. Time for this dinosaur to quietly slip into the tar pits and be relegated to the mists of time.
Sometimes, emotions make it difficult to see the most effective way of accomplishing an objective. And emotions can definitely arise when the subject is underage cyberthieves.
You’ve probably heard about the Deep Web; it become more well-known circa 2013 when the FBI took down the Silk Road drug marketplace. This brought widespread attention to the level of underground activity that goes on in this place on the internet that’s not accessible to anyone using a standard browser.