Why open source software isn't as secure as you think
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
Paul Rubens | 13 Jun | Read more
The security of open source software relies on the community spotting errors -- but Heartbleed and other recent events suggest that that's not happening.
Paul Rubens | 13 Jun | Read more
Webroot today released the results of a survey on BYOD that suggests the employee-employer trust gap is widening. The company also created an eight-point "BYOD Bill of Rights" to help bridge that gap while keeping corporate data secure.
Tom Kaneshige | 22 May | Read more
Network and boundary security are more important than ever for organizations of all sizes. A variety of security specialist firms now offer leading-edge virtual and physical devices for Unified Threat Management (UTM) to raise the security bar ever higher and respond proactively to zero-day threats.
Earl Follis and Ed Tittel | 13 May | Read more
With black hat hackers now outgunning legitimate organizations, the world's largest security company is adopting a new integrated approach to advanced threat protection.
Thor Olavsrud | 05 May | Read more
Cybersecurity insurance transfers some of the financial risk of a security breach to the insurer. But it doesn't do a good job of covering the reputation damage and business downturn that can be triggered by a security breach.
Lucian Constantin | 29 Apr | Read more
Too much security -- or too little -- could bankrupt a company. These IT executives offer advice on finding the right balance.
CIO Executive Council | 24 Mar | Read more
As Beth Jacob's resignation from Target shows, retail CIOs are culpable for security breaches even though they might not have the resources in-house to protect the company.
Tom Kaneshige | 05 Mar | Read more
Employees who use software-as-a-service (SaaS) applications are more irresponsible about password security, file transfer and IT compliance. But IT's failure to communicate about risky behaviour and provide tools to help employees do their work is part of the problem. Here are steps you can take to bring SaaS back under control.
Thor Olavsrud | 25 Feb | Read more
Experts at the Open Mobile Summit discuss the future of mobility, some have a rosy view, some a darker perspective. Perhaps mobile innovation can make life easier, but what will it cost you in terms of privacy?
Tom Kaneshige | 13 Nov | Read more
In an effort to lock down agency data and control access points, cybersecurity professionals in the federal government fail to consider the experience of end users, who say security policies are burdensome and often resort to workarounds.
Kenneth Corbin | 17 Oct | Read more
House Intelligence Committee Chairman Mike Rogers is skeptical that former NSA contractor Edward Snowden could have known to look for all the documents he leaked and been able to circumvent security checks on his own.
Kenneth Corbin | 03 Oct | Read more
Toyota's CIO says the carmaker analyzes social media commentary to learn what customers think of specific vehicles, identify quality problems and increase the accuracy of sales predictions
.
CIO Executive Council | 28 Aug | Read more
Whether you describe Edward Snowden as a hero or a criminal, theres no denying the impact that this self-described computer wizard is having on IT leaders. After all, if even the NSA can fall victim to a tech-savvy millennial, how can they defend their data?
Tom Kaneshige | 21 Aug | Read more
Revelations of the NSA's massive electronic surveillance program give fuel to foreign firms and governments that warn of privacy risks of doing business with U.S. cloud service providers.
Kenneth Corbin | 25 Jul | Read more
Government officials stress collaborative, voluntary approach as first wave of deliverables under the White House's executive order on cybersecurity comes due..
Kenneth Corbin | 13 Jun | Read more