Top 10 security stories of 2015

In the wake of data breaches, cyber espionage and cybercrime, organizations in 2015 gave security a higher profile than ever before.

Following years of high-profile data breaches, along with cyber espionage and cybercrime, organizations in 2015 started giving security a higher profile than ever before. Here are the 10 most popular security stories of the year.

10. Microsoft CEO takes a collaborative approach to cybersecurity, by Kenneth Corbin

Microsoft CEO Nadella talks of company's role in an 'ecosystem,' saying partnerships and top-to-bottom protection and detection critical to battle emerging security threats.

9. Closing the cybersecurity talent gap, one woman at a time, by Sharon Florentine

The severe shortage of cybersecurity talent is leaving the U.S. vulnerable to attacks. Women, in particular, are key to closing the security skills gap.

8. What the Anthem data breach says about the vulnerability of healthcare IT, by Paddy Padmanabhan

The Anthem data breach, along with other highly publicized cases like Sony and Target, tell us that corporate information systems are fighting a losing battle against hackers. Large health systems are most vulnerable due to their outdated IT infrastructure.

7. Cloud security: 6 steps for keeping your data safe, by Paul Gillin

Cloud service providers have little choice but to deliver world-class security. Without it they can't compete for lucrative business from big customers in industries like financial services and healthcare.

6. 4 new cybercrime trends threaten your business, by Jen A. Miller

A mid-year report shows that people aren't necessarily getting smarter about security, even in the face of increased attacks from cybercriminals.

5. Is BYOK the key to secure cloud computing?, by Mary Branscombe

Amazon, Adobe and Microsoft offer it but how realistic is it to "bring your own keys?" Do you want your business to have the burden of managing and securing your own cloud encryption keys?

4. 7 steps to protect your business from cybercrime, by Paul Mah

As cybercriminals employ increasingly sophisticated tactics to steal identities and data, and the costs and consequences of data breaches skyrocket, here are seven steps that your small business should be taking to insulate themselves from cyberattacks.

3. How OPM data breach could have been prevented, by Kenneth Corbin

The director of the U.S. government's Office of Personnel Management is out after revelations that the recently disclosed data breach was far larger than initially thought. Inspector general says warnings went ignored.

2. 5 tips to keep your data secure on the cloud, by Victoria Ivey

How can you be sure the information you store on the cloud is safe? The short answer is you can't. However, you can take some protective measures. Here are five data privacy protection tips to help you tackle the issue of cloud privacy.

1. 6 biggest business security risks and how you can fight back, by Jennifer Lonoff Schiff

IT and security experts discuss the leading causes of security breaches and what your organization can do to reduce them.

Follow Thor on Google+

Join the CSO newsletter!

Error: Please check your email address.

More about GoogleMicrosoftSony

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Thor Olavsrud

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place