Breaches are expensive, embarrassing and entice additional scrutiny from regulators and consumers alike. By taking eight key steps, you can protect private information and lessen the impact of breaches when they occur.
While user education is valuable, needed and helpful, there is one problem with this approach - it only partially works, and partially working is simply not good enough, security expert George Tubin contends.
Electronic banking fraud is as rampant as ever because of the failure to address one of the core problems, says security specialist Tom Wills, who describes why focusing only on technology to defeat Trojans will never work.
Improving collaboration among employees is the goal of Yahoo CEO Marissa Mayer's decision to ban telecommuting, but her edict means better information security as well, writes veteran CISO Patricia Titus.
The OWASP Top Ten list of security risks was created more than a decade ago to be the start of an industry standard that could bootstrap the legal system into encouraging more secure software. Here are the 2013 updates.
How do we lessen the risks posed by mobile devices and their apps, along with direct access provided to proprietary corporate data and networks? Here are five clear, actionable ways to mitigate your risks.
Using technology to prevent breaches is insufficient. Security leaders also must address the human factor, making sure staff members receive appropriate training on clear-cut policies - before it's too late.
Smaller nation-states have been upping the ante of cyber-attacks for years, and now one has shown us exactly the kind of cyberdestruction that extremist elements are willing and able to conduct, former-U.S. National Intelligence Director Mike McConnell writes.