Shan Lee finds there is much to learn from Javvad Malik’s humor in his new e-book "The CISSP Companion Handbook"
24 July 2014
With the volume of ransomware decreasing according to recent data, the quality appears to be increasing in tandem. Tom Brewster charts the evolution in the latest Tales of the Cyber Underground installment
23 July 2014
Steve Durbin of the ISF looks back at how the regulatory framework has evolved, discussing privacy, EU and US data and security directives. Durbin provides insight and guidance into how the modern CISO can build a platform that makes implementing mandated regulatory changes easier, resulting in compliance programs that manage the business safely and soundly, well before a regulator needs to intervene
22 July 2014
Ken Pfeil of Pioneer Investments sat down with Infosecurity’s Drew Amorosi in Stamford, Connecticut, as the two covered a broad range of topics. Highlights include Windows XP end of life, vulnerability assessment, choosing the right technology, and how to evaluate potential technology vendors.
18 July 2014
KPMG’s Stephen Bonner highlights that complacency about the internet’s reliability is no excuse for the lack of a contingency plan
16 July 2014
Bruce Marshall finds that one book offers up anything but an easy password creation system
15 July 2014
Information security has emerged from its geeky, niche technical origins to become an integral part of overall organizational strategy. Wendy M. Grossman details how the industry’s professionals continue evolving as business enablers
15 July 2014
At a crossroads of generational shifts in computing and security threats, Vaultive’s Elad Yoran asks, can Microsoft adapt?
11 July 2014
Denial-of-service attacks are frequently deployed, yet often organizations fail to prepare themselves against the threat. Ted Kritsonis talks to industry experts about using analytics to prevent and respond to DDoS attacks
08 July 2014
Despite having enough resources and dedicated, generous budgets to invest in the latest security solutions, large companies often fail to adequately secure their networks. When it comes to cybersecurity, Fujitsu’s David Robinson argues, large organizations face similar obstacles as their smaller counterparts
07 July 2014