As a 30-year road warrior, I’ve learned some security truths that seem wrong, but must be accepted if you really want to understand the threats you face.
Business Continuity / Opinions
There are many reasons not to pay ransom to regain access to your data. Let’s opt for the selfish one.
In light of the tragedy in Belgium columnist Rob Enderle writes that it is more important than ever to rethink our security efforts. People seem to think security is someone else’s problem, but the reality is that security is something we all need to own.
It had been custom for organizations to think of cyber security in terms of an information technology (IT) problem best left to IT people to address and fix. However, as more prolific breaches were publicized exposing a variety of sensitive personal, financial, and intellectual property-related data, it became clear that this was a rather myopic view in today’s increasingly interconnected world.
A number of Dell customers claim to have been contacted by scammers who had access to specific customer information that should have only been available to Dell. The company claims it hasn't been hacked but won't offer an explanation for the seemingly stolen data.
Security industry prognosticators rely more on marketing, hype, and our own bad memories than any knowledge of security past, present or future.
In today's global office, IT security leadership spends a great deal of time and resources creating a defense-in-depth approach to data security. This often includes layering on both logical and physical solutions as well as detailing out policies and procedures for accessing company data in a secure manner.
In the age of big data, bring-your-own-devices and internet-connected supply chains, cybercrime is big business; and cyber security has never been higher on the C-suite agenda. Here are three steps CIOs can take in this environment.
If someone with the proper motive and means (time, money, and resources) wants what you have badly enough, they are going to get it. Many companies fail to prepare for a breach until it's too late. Unfortunately, there is not a true, tested method for preventing and/or stopping a breach. How does one survive the inevitable?
According to a recent article in the Wall Street Journal, corporate boards are getting much more involved in cybersecurity. What's driving this behavior? While the Target breach probably influenced this behavior, corporate boards now realize that cybersecurity has become a pervasive risk that could have an adverse impact on all businesses.
Launched in October 2001, today (really) marks the end of support for the Windows XP operating system. As the 12+ year run of Windows XP comes to an end, it holds some curious lessons.
Make cybersecurity one of your top resolutions for 2014 - and stick to it, writes Anu Nayar, head of security, privacy and resilience at Deloitte NZ
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access - you have to rethink all types to security to protect data and lives.
The outrage is more about media hype, hypocrisy and grandstanding than firm principles.
Restoring trust in our information systems after Edward Snowden's NSA revelations will take years -- if it can be done at all.
Scammers are nothing if not innovative. It just goes to show that the best defense is an educated workforce.
Companies have to fully confront the privacy issues they face and rethink their policies from the bottom up.
Issuing deceptive statements is no way to win back customers' trust. That's a lesson for anyone who might find itself in Target's position someday.
Hackers have exposed millions of passwords from Facebook, Google, and Twitter. Sadly, password compromise is so common that it barely even registers as news any more. Suffice to say that it's probably time to change your password again.
As early as 2007, if not earlier, Windows users encountered the very first rogue antivirus programs. Even today, end users are easily fooled by this vicious type of malware.