Latest Cybersecurity Articles

5 non-traditional hiring tips for InfoSec

5 non-traditional hiring tips for InfoSec

Oct 21, 2014

There’s a dramatic shortage of qualified information security professionals in the industry today. Globally, we’re a million people short, according to Cisco’s 2014 Annual Security…

The Real Risks of Virtual Reality

The Real Risks of Virtual Reality

Oct 1, 2014

This summer, Facebook finalized its $2 billion purchase of Oculus VR, a virtual reality headset maker. The purchase promises to usher in a new era…

Back to Basics: IT security routines that won’t break the budget

Back to Basics: IT security routines that won’t break the budget

Aug 27, 2014

Just because your community bank isn’t one of the giants of the financial industry doesn’t mean it’s off the target list of today’s proliferating cybercriminals.…

Multifactor Momentum

Multifactor Momentum

Jul 14, 2014

Multifactor authentication, the process of using more than one method or system to confirm the identities of consumers online, has been around for years. But…

Tools catch security holes in open source code

Tools catch security holes in open source code

Jul 1, 2014

This year has been the best of times and the worst of times for open source code and security. On the one hand, the latest…

10 tips to attract women to infosec jobs

10 tips to attract women to infosec jobs

May 5, 2014

Women make up  just 11 percent of information security professionals.  Just increasing that number to 22 percent would solve the industry’s staffing shortage problem. Unfortunately,…

How to get creative with your penetration testing

How to get creative with your penetration testing

Apr 24, 2014

  While there are plenty of standardized methods for penetration testing that we’re all familiar with, the bad guys aren’t sticking to traditional methods for…

Open source pitfalls — and how to avoid them

Open source pitfalls — and how to avoid them

Apr 21, 2014

It’s hard to imagine a company these days that isn’t using open source software somewhere, whether it’s Linux running a company’s print and web servers,…

You Need to Get Creative With Pen Testing. Here’s How to Do It.

You Need to Get Creative With Pen Testing. Here’s How to Do It.

Apr 16, 2014

Security professionals have long been running penetration tests against their firewalls and other security systems to find weaknesses that need to be addressed. The Common…

Forgotten risks hide in legacy systems

Forgotten risks hide in legacy systems

Apr 3, 2014

Cover story These days, there’s no shortage of new business technologies and new threat vectors to the enterprise. But what many companies forget is that…

Info sec industry still struggles to attract women

Info sec industry still struggles to attract women

Mar 25, 2014

Even as women have made dramatic advances in medicine, law, and other fields, the proportion of women pursuing undergraduate degrees in the computer sciences has…

Don’t click on these links

Don’t click on these links

Dec 2, 2013

Whether you receive a phishing email inviting you to click on a specific link, whether you see the link on your trusted social media sites,…

How to stay one step ahead of phishing attacks

How to stay one step ahead of phishing attacks

Dec 2, 2013

Phishers are upping their game, so end users need to respond accordingly Protecting yourself against phishing attacks used to be relatively easy. Don’t download unexpected…

Is open source encryption the answer to NSA snooping?

Is open source encryption the answer to NSA snooping?

Nov 28, 2013

When Unisys CISO John Frymier came in to work on Friday, Sept. 6, the phones were ringing, and continued to ring all day. Customers were…

SaaS vendors, customers, finding new ways to secure the cloud

SaaS vendors, customers, finding new ways to secure the cloud

Oct 15, 2013

Rogue employees, hackers, government employees all threats to keeping information stored on the cloud private Edward Snowden’s leaks about NSA spying may have brought the…

10 encryption tips for the enterprise

10 encryption tips for the enterprise

Oct 1, 2013

Whether you’re protecting corporate data from internal leakers, hackers looking to steal money from you and your customers, foreign spies, your own government, or employees…

Security Keys

Security Keys

Sep 1, 2013

What treasury and finance executives need to know about encryption Treasury and finance executives need to know enough about encryption and security to  ensure that…

Cloudy Outlook

Cloudy Outlook

Apr 1, 2013

Cloudy Does the cloud help or  hinder credit card payment  security and compliance? Depending on whom you ask, processing  credit card payments in the cloud…

Policy Debate

Policy Debate

Nov 1, 2012

Cyberinsurance still a puzzle for many companies

Cyberinsurance: Products Mature but Still Underused

Cyberinsurance: Products Mature but Still Underused

Sep 27, 2012

Risk transfer opportunities have proliferated, as have the threats The bad news keeps coming. Every month, some company somewhere is hacked and loses confidential data.…

Bitcoin: Seven reasons to be wary

Bitcoin: Seven reasons to be wary

Jul 23, 2012

Of all the virtual currencies out there, BitCoin is the most interesting from a technical perspective – and the least interesting from the business point…

Virtual Worlds, Real Risks

Virtual Worlds, Real Risks

Jul 17, 2012

Online communities and collaborative workspaces create operational and security vulnerabilities — but also opportunities to  deploy enterprise-grade, risk-based solutions. Carroll University’s library commons was a…

Manage Those User Privileges

Manage Those User Privileges

Feb 4, 2012

In most companies, too many employees have too many privileges. After all, they are quick to speak up when they need access to data or…

Cyber Security Review

Cyber Security Review

Feb 1, 2012

As threats proliferate, here are five areas where companies need to strengthen and update their policies and practices. It’s particularly galling when a company specializing…

How to Survive a Cloud Outage

How to Survive a Cloud Outage

Jul 11, 2011

Amazon’s infamous cloud outage in April brought down a number of popular Web sites, including foursquare and Reddit – but many of Amazon’s enterprise cloud…

Fail-Safe for Clouds

Fail-Safe for Clouds

Jun 1, 2011

Companies with backup systems in place kept their businesses running when a major outage at Amazon shut down websites.

When Employees Sneak Into Consumer Clouds

When Employees Sneak Into Consumer Clouds

Apr 4, 2011

Many companies, both small and large, are wary of doing business with cloud providers because of concerns about outages, data loss, and privacy issues. These…

Putting IPads to Work

Putting IPads to Work

Apr 1, 2011

Spurred by enthusiastic senior executives and rank-and-file employees, companies are starting to roll out iPads in the enterprise, especially for board meetings and sales staff.

Cloud Containment

Cloud Containment

Apr 1, 2011

As cloud vendors mature, Web-based delivery of applications, storage and infrastructure is getting more secure and trustworthy.

Driving Monitor

Driving Monitor

Mar 1, 2011

If an iPhone can make people healthier by tracking how many steps they take, why can’t something similar make cars and trucks safer by monitoring…