Information Security

Information Security news, analysis, how-to, opinion and video. | CIO

customer loyalty ts
cloud security lock

fbis most wanted cybercriminals

FBI's top 10 most wanted cybercriminals

The internet has impacted the world in numerous ways, but it isn't always positive. Thanks to technology, we now have the rise of the cybercriminal, and the FBI even has a most wanted list for these criminals.

Maginot Line

Dell shifts security focus to data itself

Dell Data Guardian is a new type of security product that eschews Maginot-line-type walls and instead goes for protecting the data itself. Each file has its own encryption and security policy. This granular approach allows for a...

microphone interview voice reporter

Vocal theft on the horizon

Voice imitation technology has the potential to undermine yet another form of biometric authentication. Security experts say the key is to make sure the individual voice information is stored on the user’s device, not in a centralized...

key metal home security encryption

How to make Fully Homomorphic Encryption 'practical and usable'

Fully Homomorphic Encryption (FHE) for years has been a promising approach to protecting data while it’s being computed on, but making it fast enough and easy enough to use has been a challenge.

What is ransomware and how do I protect my PC from WannaCry?

Everything you need to know about ransomware including the WannaCry attack, how to protect your PCs and laptops and what to do if you're affected.

medical records laptop doctor

Ransomware makes healthcare wannacry

The NHS ordeal is a wakeup call to healthcare administrators as to what needs to be done to make sure patients and their data are safe. Find out what advice vendors provide.

kaboom wanna cry

What to do about WannaCry if you’re infected or if you’re not

Tips on protecting computers against WannaCry and remediating ones already infected.

horse asleep

Risks to the enterprise from the one-trick pony

Whether an adversary is highly skilled and targeting an organization or taking advantage of a black market service to make a few bucks, any threat is a threat.

chair spotlight

How CISOs can answer difficult questions from CEOs

A hypothetical conversation can become all too real, and hopefully you are prepared with the answers. Here is a script to help get you started.

1 incident response police tape crime death

Incident response is like tracking down a perpetrator

What is incident response? Larry Zulch, President & CEO, Savvius, walks us through the crime scene.

password security

Vendors approve of NIST password draft

The draft guidelines revise password security recommendations and altering many of the standards and best practices security professionals use when forming policies for their companies.

marketing man person communication

8 things CMOs need to know right now

At the recent Marketing Nation Summit, industry leaders offered CMOs tips and strategies for success — including why less is more when marketing to customers.

firewall hole

Third parties leave your network open to attacks

With the Target example as the high-water mark, enterprises need to worry about the lack of security on a third parties’ part. How do you tighten things up?

Cloud can ease burden of data protection compliance, Google execs say

The EU's General Data Protection Regulation (GDPR) is fast approaching but with significant resource investment required, many organisations are struggling to meet the May 2018 deadline.

0 intro strikeout baseball

How to strike ransomware out

Carbonite created this list of 10 important ransomware prevention tips and best practices.

marketing automation gears

Automated mitigation on endpoint devices and networks can be tricky

Many companies have automated systems in place for preventing, detecting, and investigating security incidents, but automating the incident response and mitigation process for networks and endpoint devices has been a tougher nut to...

blockchain ecosystem

How the disruptive power of Blockchain could impact the digital economy

Blockchain holds plenty of promise for security and interoperability, but IT leaders are still trying to better understand the technology and how to put it to use. This much-hyped technology has an incredible power to disrupt many...

fatigue

False positives still cause threat alert fatigue

How you set up and prioritize which alerts to look at and act on is the basis for an effective threat management strategy.

Load More