What's it like to be a CIO or CISO at an enterprise where everyone is a security expert? What are some of the unique challenges and advantages? Blue Coat Systems CIO Chris Birrell shares his experiences in this role.
President Obama has signed legislation to incentivize businesses to share cyber threat information with the federal government. On Dec. 18, both houses of Congress passed the measure as part of a $1.1 trillion spending package.
Threats are becoming more sophisticated, and breaches are becoming more difficult to both contain and resolve. This video demonstrates how the Security Analytics Platform and SSL Visibility Appliance provides full visibility and context to any security event to fully understand and eradicate advanced attacks.
Cybersecurity is becoming an issue in the U.S. presidential campaign, finally. That's good news because it's critical in our day-to-day lives. But are the candidates doing the issue justice in the way they address it?
A panel of experts at the DSCI summit discuss security and privacy imperatives for enterprises to help secure the digital age. As threat vectors grow, it is mandated to gain greater visibility into the infrastructure for quick action.
Police in Britain have arrested a 21-year-old man on suspicion of "hacking offenses" related to the breach of Hong Kong toymaker VTech. Separately, the CEO of hacked London telco TalkTalk testified about her organization's security before Parliament.
A security researcher warns he was able to find online "sensitive account details" for 13 million users of MacKeeper. The software was the focus of a recently settled class-action lawsuit - alleging deceptive advertising and false claims.
It's that time of the year. DSCI's Annual Security Summit and its Excellence Awards have arrived. Here are some of the exciting sessions and speakers that I will definitely be checking out at this year's event.
Security experts are warning that Internet-connected devices - including toys - should be treated as insecure and untrusted until proven otherwise. Have our collective information security shortcomings ever been more seasonally appropriate - or scarier?
New details emerging about a breach involving a former Morgan Stanley employee illustrate how a case of inappropriate access to data can blossom into something much more serious. The case shines a spotlight on the urgent need to mitigate insider threats.
A former member of the NullCrew hacking group has pleaded guilty to participating in attacks against several organizations, including Bell Canada, Comcast and the U.K.'s Ministry of Defense, which the gang claimed to have exploited via SQL injection flaws.
The Data Security Act of 2015, approved by the House Financial Services Committee, would create a national data breach notification requirement and spell out data security standards businesses must follow, usurping 47 state laws.
Amidst a perfect storm of circumstances, how will CISOs ensure that they remain relevant? Is outsourced security and MSSP dependence going to take over? Or are virtual CISO specialists going to rule the roost?
The government of India reports an increase in the annual number of cybersecurity incidents. But what is being done to curb this increase? Security experts offer their recommendations for tracking and reducing these crimes.
Turns out electronic learning products can be bad for children's privacy - and for their parents too. The VTech breach highlights how, despite repeated warnings, too many manufacturers continue to not take security seriously.