Security

Profiles in Cybersecurity: Steve Martino, Chief Information Security Officer, Cisco (Forbes)

To be a successful Chief Information officer (CISO) today, “you have to be a good translator,” says Steve Martino. This means translating the business strategy to the risk the ... More

Kroll Names Amine Antari, Sameeh El-Din Managing Directors, Dubai Office (CDSA)

Kroll has announced the appointment of Amine Antari and Sameeh El-Din as Managing Directors in the firm's Dubai, United Arab Emirates office. Antari and El-Din bring decades of bro... More

5 Information Security Threats That Will Dominate 2018 (CIO)

The IoT - Organizations are increasingly adopting IoT devices, but most IoT devices are not secure by design. Additionally, the ISF warns there will be an increasing lack of transp... More

You Can Have Your Security Cake and Eat It, Too (Forbes)

Alan Zeichick, Oracle: It’s all about the tradeoffs! You can have the chicken or the fish, but not both. You can have the big engine in your new car, but that means a stick shift... More

Irdeto Extends Security Partnership with Foxtel (HITS)

Irdeto has extended its long-standing security partnership with Foxtel, Australia’s leading pay TV operator. With Irdeto, Foxtel has a reliable and stable security partner that w... More

Why Preventing IoT Attacks Isn’t Just the Responsibility of Security Experts (Tech Republic)

Internet of Things (IoT) flaws can leave your company vulnerable to a multitude of attacks. TechRepublic's Dan Patterson met with Anthony Grieco, senior director and trust strategy... More

PwC Study Shows Firms Unprepared for Cyber Attacks (MediaPost)

Despite blaring headlines about cyber attacks, many companies are unprepared to cope with one, according to “The Global State Of Security Survey,” a study by PricewaterhouseCoo... More

Is Blockchain the Ultimate Weapon Against Cybercrime? (Dataconomy)

Blockchain’s reach has gone past FinTech and is now finding more applications in cybersecurity. Threats have become more rampant and complex. As such, cybersecurity firms are now... More

Why Email Security is Your Next Big Opportunity (IT Pro)

News headlines frequently tout the proliferation of email-based spam and malware. In 2014, two-thirds of all email traffic was spam. For mid-sized businesses, spam and viruses have... More

SAS Founder Jim Goodnight Doesn’t Buy the AI Hype But Has High Hopes for Analytics at the Edge (ComputerWorldUK)

SAS Institute CEO and co-founder Dr Jim Goodnight has played a central role in the rise of data analytics in his 41 years at the helm of the software giant, but he doesn't buy the ... More

NSS Labs Conducts First Cross-Platform Test of Leading Web Browsers (CDSA)

NSS Labs today announced the release of its Web Browser Security Comparative Reports. The reports reveal how effective web browsers are at protecting users from socially engineered... More

KRACK Attack: Here’s How Companies are Responding (CNET)

A serious Wi-Fi security flaw was revealed Monday, and it puts everything from your phone to your smart refrigerator at risk. An exploit called KRACK, short for Key Reinstallation ... More

10 Steps for Writing a Secure Mobile App (Dark Reading)

More than 4 million mobile apps are currently in production, but only 29% on average are tested for bugs, and nearly a third of these contain significant vulnerabilities, according... More

Here’s How to Rethink the Role of Robots in Our Lives (Tech Wire Asia)

Mark Hearn, Director of IoT, Irdeto: "Organizations today know that they need to have a cybersecurity strategy in place to protect their intellectual property and sensitive data fr... More

10 Critical Security Skills Every IT Team Needs (CIO)

2. Security analysis - Tools are important, but it’s also critical to understand how they fit into your overall security strategy, says Stanger. “Before you can figure out whic... More

NSS Labs Initiates Group Test Analysis Coverage of SD-WAN Market, Call for Industry Input (HITS)

NSS Labs announced that it is expanding on its strong core foundation of point-in-time test validation and continuous security validation with the introduction of the Software-Defi... More

3 Tips for Making Better Investments in Security (InformationWeek)

The kids are back in school, the leaves are changing color, and the days are growing shorter – all signs it’s time for IT leaders to start thinking seriously about next year’... More

Identifying ‘Key Indicators of Compromise’ Crucial to Data Breach Detection (IT Pro Portal)

Traditional cybersecurity protection, like anti-virus tools, perimeter defences or firewalls, are virtually powerless to defend against today’s tech-savvy cybercriminals, who now... More

How Netflix Hacks: Behind the Scenes at the Streaming Giant’s Hack Day (Variety)

“Ladies and gentlemen, boys, and girls, children of all ages!” yelled Netflix senior software engineer Alex Wolfe from the stage in front of about 300 of his colleagues on a re... More

How to Set Up Identity Access Management for a BYOD Workplace (Okta Blog)

n the United States, 35% of employees are now contractors or freelancers. And according to the U.S. Bureau of Labor Statistics, the average length of time a person stays at one com... More