Information Security

Information Security news, analysis, how-to, opinion and video. | CIO

android vs iOS security boxing gloves battle
Cyber security breach attack on monitor with binary code

healthcare cloud

The incredible, shrinking shelf life of healthcare technology strategy

A perfect storm of policy uncertainty, marketplace transformation, and technology evolution has made strategic planning increasingly difficult for CIOs.

16 hackers

Hackers are aggressively targeting law firms' data

Even law firms are no longer safe from hackers. Here's why.

librem13v2 persp crop secure laptop

Smartphone vs laptop survey shows false sense of security

According to a recent survey from AlertSec, only 45% of Americans know they have anti-virus protection on their laptops. CIO takes a look at standard security precautions — like lock screen passwords — which create a false sense of...

stock security

Cyber starts with skilled workers

Cyber attacks will continue to become more complex, frequent and destructive. Yet, when discussing cybersecurity, we consistently avoid focusing on the elephant in the room. We do not have enough cybersecurity professionals to help...

2 educate employees

Human liability in security

Cybersecurity is becoming an issue that is impossible to ignore and it is extremely complex in its nature. The one area that is critical and cannot be ignored is the human factor. You can buy all of the best firewalls and tools but...

cloud security lock

Stay out of security breach headlines: 3 things that must be addressed in your cloud agreement

If done correctly and with the proper level of insight, there are ways to mitigate the risks associated with such breaches.

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

Maginot Line

Dell shifts security focus to data itself

Dell Data Guardian is a new type of security product that eschews Maginot-line-type walls and instead goes for protecting the data itself. Each file has its own encryption and security policy. This granular approach allows for a...

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

key metal home security encryption

How to make Fully Homomorphic Encryption 'practical and usable'

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.

What is ransomware and how do I protect my PC from WannaCry?

Everything you need to know about ransomware including the WannaCry attack, how to protect your PCs and laptops and what to do if you're affected.

medical records laptop doctor

Ransomware makes healthcare wannacry

The NHS ordeal is a wakeup call to healthcare administrators as to what needs to be done to make sure patients and their data are safe. Find out what advice vendors provide.

kaboom wanna cry

What to do about WannaCry if you’re infected or if you’re not

Tips on protecting computers against WannaCry and remediating ones already infected.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

password security

Vendors approve of NIST password draft

The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.

marketing man person communication

8 things CMOs need to know right now

At the recent Marketing Nation Summit, industry leaders offered CMOs tips and strategies for success — including why less is more when marketing to customers.

Load More