- Seven technology predictions for 2014
- French Treasury accidentally signs SSL certificate for Google.com domains
- Hacker-built drone can hunt, hijack other drones
- Blue Cross: 840,000 healthcare records at risk after laptop theft
- The week in security: Microsoft fights NSA as shadow IT bites business
CSOs must focus less on technology and proactively engage the business by framing security risks in business terms, developing detailed worst-case models and reworking IT security risk assessment processes around business requirements, a report from the Security for Business Innovation Council has advised.
Hard-to-find security skills and the rapid pace of malware evolution make a strong relationship with a managed security services (MSS) provider as important as maintaining the internal tools to keep business executives apprised of IT-security risk, Foxtel information security manager Kevin Shaw has advised.
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead.
Startup NetCitadel today launched with a product called OneControl intended to automate what might otherwise be manual research and changes related to configuring firewalls, switches or other gear when virtual-machine (VM) workloads are spun up or down in enterprise data centers or cloud environments.
There's a need to rely and trust forces outside our direct control for security -- and that awareness spurred the United Kingdom's national infrastructure protection authority to push for a standard way to model the implications of relying on technology, services, people and more.
As 2012 comes to a close, it's time to reflect on the security trends of the year with this look at the hottest security slideshows of 2012.
Sign up now »
Reduce complexity and increase trust for public cloud service providers and their customers.
Incident handling is a vast topic, but here are a few tips for you to consider in your incident response. I hope you never have to use them, but the odds are at some point you will and I hope being ready saves you pain (or your job!).
- Have an incident response plan.
- Pre-define your incident response team
- Define your approach: watch and learn or contain and recover.
- Pre-distribute call cards.
- Forensic and incident response data capture.
- Get your users on-side.
- Know how to report crimes and engage law enforcement.
- Practice makes perfect.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.