Top cyber security concerns: Malicious code, employees run amok
When 3,300 information-technology professionals were asked about cyber security, they said malicious code attacks accounted for the main type of cyber attack their organizations suffered during the...
View ArticleWhy physical security matters, even in the cloud
At the Business of Cloud Computing Conference, I caught a presentation by Marlin Pohlman, who noted that No. 3 on the Cloud Security Alliance's "Top Threats to Cloud Computing" list is malicious...
View ArticleBy the numbers: The impact of data breaches
Dek: Websense 'Security Pros and Cons' survey of 1,000 IT managers confirms that data breaches are widespread. Here's a look at how organizations are responding. Source: Network World No
View ArticleMost fraud is an inside job, says survey
Fraud cost organizations 2.1 percent of earnings in the past 12 months, which is equivalent to a week of revenues over the course of a year, according to the Kroll Annual Global Fraud Report, a recent...
View Article5 security breakthroughs promise to thwart threats
For the past 25 years, a war has waged between malicious programmers and the researchers trying to make computing safe for the enterprise. The battle has shown no signs of subsiding — once a new...
View ArticleSecondhand networks and back-alley firmware
When it's time to update firmware on, say, a router or a switch, the vast majority of folks head to the vendor site and grab whatever version they need, easy-peasy. But a large and growing number of...
View ArticleArchitectural rule No. 1: Segregate everything
Enterprise IT infrastructures now face such an explosion of applications, devices, and data that just running in place is hard enough. Nobody seems to have the time or resources to design new systems...
View ArticleIBM software eases role-based security operations
IBM this week announced an identity-management analytics tool that eases what can be a tedious job for information-technology managers -- defining roles for employees in order to establish policy-based...
View ArticleFederal Reserve contractor charged with source code theft
A U.S. Federal Reserve contractor has been charged with copying the source code of software that keeps track of large exchanges of money between U.S. government agencies.Bo Zhang, who lives in Queens,...
View ArticleMobile data privacy is terra incognita to users and developers
President Obama's move Thursday to establish a so-called Privacy Bill of Rights for the Internet can be seen as the consolidation of decade-long efforts by disparate groups to improve privacy...
View ArticleMost organizations take months -- or years -- to discover a breach
Over 90 percent of data breaches are the result of external attacks and almost 60 percent of organizations discovered them months or years later, Verizon said in a report released at the RSA security...
View Article6 tips for secure cloud shopping
Cloud service providers are taking advantage of buyer ignorance about cloud security, pushing tantalizingly low-cost service contracts that don't meet prospective customers' security needs.
View ArticleWill the real security threat please stand up?
This week saw two somewhat conflicting reports on our current state of insecurity. The news ain't good, but it's better than you might expect.First up, Verizon released its eighth annual Data Breach...
View ArticleDownload the Insider Threat Deep Dive Report
Insiders are responsible for as much as 80 percent of malicious attacks. Because insiders are trusted by nature, detecting their illicit activities requires an array of monitoring, scanning, and other...
View ArticleSecurity swallows the CEO
In an era when security breaches hog the headlines and companies scramble to protect corporate data, in some ways I'm grateful to work for a CEO who emphasizes the need for security. But there are...
View ArticleCisco's ugly bait and switch
You may have heard about Cisco's shenanigans last week, in which an automatic firmware update for several models of the company's Linksys home wireless routers forced users to create and log into a...
View ArticleSlimeball boss learns you don't mess with IT
Honesty is always the best policy -- unless, it seems, you work in the upper echelons of the corporate world, in which case all too often honesty becomes optional based on cost analysis and the impact...
View ArticleSecure or not? 10 spot checks will tell you
I don't know about you, but I can tell in about a minute how much someone I've just met knows about computers, networks, and security. It's in what they say, how they respond, and what they think about...
View Article5 places your data goes to hide
"Information wants to be free" is a gross understatement.Enterprises blanket their systems with security in the attempt to saturate every data repository with protection. Organizations affirm the logic...
View Article
More Pages to Explore .....