Few would deny the chief security officer role has evolved quite a bit in recent years. At many large companies, the heads of both physical and information security now report in to the same person, an enterprise CSO.
After years of guesswork and innumerable attempts to quantify the costly effects of cybercrime on the U.S. and world economies, McAfee engaged the Center for Strategic and International Studies (CSIS)
Use Dropbox as a backdoor into corporate networks. Check. Suck information out of pacemakers. Check. The Black Hat conference convening in Las Vegas next week offers hacker tools for all of those plus more.
Last week we posted an article on the 25 Information Security Leaders to follow on Twitter [link], unfortunately, as some of our eagle eyed readers pointed out, our list was dominated by men
When Kate Middleton, the Duchess of Cambridge, went into labor with the child who recently became third in line for the throne of England, the event immediately had millions of royal-watchers riveted
Everyone has an opinion about the ‘Cloud’ and its effect on business – some believe it is dark and scary and fraught with unnecessary risk, while others would argue it’s silver lined and the path to greater business performance and cost savings.
Local newspapers one day ago joyfully reported that the server which commanded and controlled the hacking to online newspapers was found and neutralized. However, the disaster has not ended yet.
Belkin expanded its secure product line with the addition of the Belkin DisplayPort KVM Switch.
US privacy and computer security advocate Micah Lee describes himself, amongst other things, as “a staff technologist for EFF and the project maintainer of HTTPS Everywhere.”