Employees generally want to protect data against compromise but few understand the sensitivity of their data or the role of anything but passwords in protecting it, according to a new study that highlighted the difficulties that over-optimistic CSOs have in building an active security culture.
David Braue |
02 Jun |
Read more
Hackers stole data of more than 150 million users of a wildly popular fitness and dietary tracking app MyFitnessPal, as announced by its parent company Under Armour on Thursday, March 29.
Harold Kilpatrick |
09 Apr |
Read more
There’s a new mandate for businesses worldwide — not merely ‘doing digital’ anymore, but actually ‘being digital’.
Jayajyoti Sengupta, Cognizant |
29 Mar |
Read more
US-CERT recommends admins should patch three bugs Cisco released fixes for on Wednesday.
Liam Tung |
08 Mar |
Read more
“Cross-pollination” between nation-state groups and cybercriminal gangs has escalated the clear and present danger to business targets
David Braue |
01 Mar |
Read more
There is no question we are living in times of turbulence, but these are also times of unprecedented opportunity for enterprises to harness technology to connect with customers in innovative ways.
Matt Loeb |
26 Feb |
Read more
Cleaner and optimizer programs put on notice.
Liam Tung |
01 Feb |
Read more
A recent story in CSO highlights the disparity between “information security” (a.k.a. IT security) and “cybersecurity” — namely total spending and market growth.
Steve Morgan |
18 Dec |
Read more
RFID wallets, sleeves and clothing are security snake oil. You don't need RFID protection because there is no RFID crime.
Roger A. Grimes |
18 Dec |
Read more
Anytime a new flashy household device is released on the market, internet connectivity is promoted as one of its main features.
Robert Le Busque |
13 Dec |
Read more
The security threats and breaches of 2017, from WannaCry to Petya, Equifax to DaFont, have set new records for personal data invasion and impacted hundreds of millions of people globally.
David Oakley |
11 Dec |
Read more
IT administrators are too busy to manually check their systems for leaks minute-by-minute, day-by-day.
Daniel Sultana |
11 Dec |
Read more
Today’s digital economy sees established enterprises competing against start-ups, enterprises worrying about risk, and smart enterprises deploying digital technologies capable of transforming their enterprise and enabling better business-to-customer interactions and relationships.
Matt Loeb |
01 Dec |
Read more
With all the talk associated with North Korea's prospects of launching a nuclear attack, there is often an overlooked, existential threat that continues to fly under the radar - cyber attacks.
Eric O’Neill |
10 Nov |
Read more
The pushing of billions of insecure Internet of things (IoT) devices into the market has already “poisoned” the Internet with a level of vulnerabilities that will be hard to claw back from, one security specialist has said in warning that “the damage is already done”.
David Braue |
01 Nov |
Read more
The days of cybersecurity being treated as a technology concern have passed us by. Cybersecurity is now and will remain a strategic business risk.
Matt Loeb |
01 Nov |
Read more
When growing up, many of us probably heard warnings from our parents to be careful in certain environments—the local woods, a busy side street or at the beach. Our parents cautioned us out of concern for our well-being, and it served a purpose.
Matt Loeb |
30 Aug |
Read more
Recent ransomware attacks underscore the importance of a unified global response.
Matt Loeb |
02 Aug |
Read more
Many cities claim to be ahead of smart curve, but find themselves handcuffed by custom systems
Matt Loeb |
13 Jul |
Read more
Developers are demanding answers from Apple after a $400-a-month iPhone VPN become a top grossing app on the App Store.
Liam Tung |
12 Jun |
Read more