With organizations racing to be the first-to-market with the latest, coolest app, they are forgetting something critically important: applying security principles in the development and deployment.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
Using technology to prevent breaches is insufficient. Security leaders also must address the human factor, making sure staff members receive appropriate training on clear-cut policies - before it's too late.
In the rush to allow personal devices to be used for work, we in application security neglected to examine thoroughly the new risks external applications may introduce to our organizations.
The longtime chief information security officer at the CIA understands the appeal of hacking hackers, but Robert Bigman cautions that such revenge might not be so sweet.
Smaller nation-states have been upping the ante of cyber-attacks for years, and now one has shown us exactly the kind of cyberdestruction that extremist elements are willing and able to conduct, former-U.S. National Intelligence Director Mike McConnell writes.
How do we provide mobile applications to our users that fulfill their need for immediate access, but also provide them with assurance that their information is safe? Here are four fundamentals.
Making an appearance twice a year just to ask for additional budget will not cut it. The CISO needs to make sure the board members know that he or she is a true enabler of the business.
Unlike managing commercial and operational challenges, in a crisis the route map to follow is often unclear and the consequences of failure much more serious. Here are tips for effective management.
Across the board, the job market in the U.S. is extremely competitive. Yet, fraud examiners are in demand -- and there are some tactics you can use to give yourself an edge when seeking a new job.
The continuing loss of data to China suggests that the federal government should carefully assess the cybersecurity implications associated with the expansion of Chinese cloud and mobile providers in the U.S.
When you and I say 'cloud,' we may think of two very different things, ISACA leader Peter Spier writes. Partly this stems from a lack of common definition on the term. Read on to see how such confusion can be overcome.
I don't care how old you are, there will be demand for this kind of talent for the rest of your career. However, if AppSec was easy, the supply of talent would meet the demand. That's not the case.
Job hunting today is a bit like a game. It can be confusing and even a little scary. And if you haven't played in a while, you may be mystified by how the rules and the playground have changed.
Secure is a possible state of affairs at a certain point in time. But rugged describes staying ahead of the threat over time. Rugged organizations create secure code as a byproduct of their culture.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.co.uk, you agree to our use of cookies.