applications - News, Features, and Slideshows

Features

  • Are smart cars putting our safety at risk?

    Smart cars are savvy, technologically advanced, and computerized devices connected to navigation and entertainment systems, but they also record personal data and have the potential to be hacked. Who owns that information, how it is shared, and how manufacturers can protect against hacking remains unregulated, which is why Sen. Edward Markey (D-Mass.) wants drivers protected.

    Kacy Zurkus | 24 Mar | Read more

  • Hamamatsu eliminates malware with virtual appliances

    When you're a company with branches across the country and a malware infection leads to all its outbound email being blacklisted as spam, you have one thing in mind: fix the problem and fix it fast. That's the situation the U.S. operations of Japanese optical sensor maker Hamamatsu found itself in when it turned to a cloud security provider to turn things around in a hurry.

    John P. Mello Jr. | 20 Feb | Read more

  • CSO50 winners announced

    Each year, the CSO50 awards honor 50 security projects and initiatives that have delivered groundbreaking business value through the innovative application of risk and security concepts and technologies. Here are the 2015 winners:

    Stacy Collett | 04 Feb | Read more

  • CSO50 2015: Creating a Human Firewall

    Human nature dictates that you can never expect 100% of the people to follow instructions 100% of the time. The same holds true when it comes to protecting information security. At safety science company UL LLC in Northbrook, Ill., Steve Wenc, senior vice president and chief risk officer, and Robert Jamieson, IT security officer, realized early on in their security education efforts that reducing risk would require more than just lectures and written instructions.

    Stacy Collett | 04 Feb | Read more

  • Death of antivirus software greatly exaggerated

    An executive at a company whose name is synonymous with antivirus software raised eyebrows earlier this year when he pronounced the death of that form of system protection. Nevertheless, while the effectiveness of that software may have waned over the years, security experts say the pronouncement by Symantec's senior vice president for information security Brian Dye was premature.

    John P. Mello Jr. | 16 Dec | Read more

  • Nearly a billion records were compromised in 2014

    In first nine months of 2014, after 1,922 confirmed incidents, criminals managed to compromise 904 million records. Many of the incidents reported in 2014 were record setting, including twenty of them that resulted in the compromise of more than a million records each.

    Steve Ragan | 18 Nov | Read more

  • The top infosec issues of 2014

    There is still time for any list of the "top information security issues of 2014" to be rendered obsolete. The holiday shopping season is just getting into high gear, after all, and everybody knows it was from late November to mid-December last year when the catastrophic Target breach occurred.

    Taylor Armerding | 18 Nov | Read more