Concerns over possible nefarious use of the cryptocurrency may be causing Visa, MasterCard and others to tap the brakes on the project.
Infrastructure / Features
Mobile printing is making major strides right now. Is your company's mobile print security up to speed?
How much security risk can an organization accept before it’s on very thin ice? The equation is simple: decide how much money it will take to reduce the risk, and how much more money an organization will earn by accepting that risk. Equifax presumably decided that accepting a large amount of risk, in hopes of making a larger amount of money, was a good gamble. In the case of the massive data breach, Equifax lost that gamble badly.
Medical devices lack many features and capabilities that help protect other network-attached devices from attack.
There is no manual on how to get noticed by key executives. Here are some tips for getting on a board of directors as the cybersecurity expert.
As big data initiatives gain steam at organizations, many companies are creating “data lakes” to provide a large number of users with access to the data they need. And as with almost every type of new IT initiative, this comes with a variety of security risks that enterprises must address.
Devops is transforming application development; the same principles of automation, integration, and collaboration can vastly improve security as well
A group within Western Union information security team relies on cloud software, including content management, social collaboration and single sign-on tools to let employees to get their work done while protecting corporate data.
Cisco’s security intelligence and research group Talos, said that it had reported a serious vulnerability in Rockwell Automation’s industrial control system – the MicroLogix 1400 programmable logic controller (PLC).
The Simple Network Management Protocol exploit could let an attacker take complete remote control of the MicroLogix system and modify the device firmware, letting an invader run his own malicious code on the device.
KPMG found that while 80 percent of organizations acknowledged being hacked, only half have invested in cybersecurity technologies in the past year. The research firm has a theory as to why.
These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.
The FIDO Alliance, formed just four years ago to find a better way than passwords for online authentication, is promoting a standard that keeps user credentials only on the user device. An attacker would have to steal your device to hack your account, they say.
CIOs are addressing major pain points in corporate workflows by consolidating approval requests into lightweight ’micro apps.’
The only sure way to protect yourself or your company from 'ransomware' is with foolproof file backups. These three backup options can all help recover from ransomware attacks.
Corporate employees who help carry out cyberattacks are increasingly being sought and are seeking criminals to hire them
How much do network architects take security into account when building websites, and does testing extend out to third-party code?
Security tools are crucial in protecting organizations from online threats. But the glut of tools on the market can lead to information overload for CISOs trying to evaluate them all.
If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?
Finding cybersecurity talent isn't easy, but it's even harder if you use the same methods that work for other IT talent specialties. Here's how to get it right.
An increasing number of experts are urging companies to stop having the CSOs and CISOs report to the CIO in order to reduce conflict of interest, risk, even downtime and financial losses, but there hasn't yet been much evidence of progress.