Information Security

Information Security news, analysis, how-to, opinion and video. | CIO

question marks pavement
blue abstract password and login access security internet

number five

5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’

For all US-based companies that might have EU data, it’s time to segregate that data and initiate proper protocols to ensure fines don’t come your way after May.

facebook primary

Digital exhaust royalty: will it solve some of Facebook and Google’s personal data usage travails?

Has the time come now for users to be paid royalty for use of their “digital exhaust” by corporations like Facebook and Google? Will a digital exhaust royalty framework be win-win for both: the corporations whose business model is...

illustration showing interaction between human and artificially intelligent workers

Bridging the cyber skills gap with automation

More than ever, we need automation to move security from human to machine speed.

European Union [EU] flag-lock on top of a map of Europe

Becoming GDPR compliant quickly, effectively and risk-free

The hype around the GDPR compliance has recently reached the fever pitch recently. Thus, it seems essential to share the tips that help company become GDPR compliant without risks and on time.

business people conference room collaboration boardroom

Board and management responsibilities for information security

Only 37% of corporate directors are confident with their organizations’ cyber security plans. What responsibilities do corporate and public-sector boards have for oversight of cyber and information security and what resources are...

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

access computer through your phone skeleton key unlocking

Establishing role-based access control in the workplace

Access control is necessary, and every organization must implement it in some form.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

puzzle pieces problem solved teamwork collaboration

CIO 2020: Greater collaboration, and an end to control-based security

Given the meteoric rise in the number of security breaches in recent years, CIOs and CISOs need to be highly aligned and collaborative around every corporate initiative.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

johann sebastian bach stamp

5 things J. S. Bach can teach you about information security

What can a centuries-old classical music composer teach today's CIOs about infosec? Plenty, it turns out...if you'll only listen.

container technology

Best practices for a secure and trustworthy container platform strategy

Container technology has a direct impact on the agility of a software development team and consequently have seen a huge increase in interest, adoption and usage.

passport stamps

Blockchain IDs need international consensus

Just as they agreed on the booklet format of a passport and the information included within, they must also do so for the next generation of IDs.

hammer 154045038

Looking for nails to hit with my blockchain hammer

A Q&A with Adventium blockchain expert T.D. Smith

Google self driving car

How blockchain is hastening the advance of autonomous cars

Blockchain is quickly achieving parity between human and robotic drivers, and should soon accelerate self-driving solutions into the realm of statistical perfection.

eye on computer monitor showing privacy security or breach

EU privacy law says companies need to explain the algorithms they use

Explainable AI is needed to fully comply with the new EU data protection law. But companies don't need to sacrifice the benefits of machine learning accuracy to do it.

woman leader hipster execs diversity

Cybersecurity is every IT leader’s job

October is National Cyber Security Awareness Month, and is supposed to remind us of the magnitude of the growing cybersecurity threat. As if we needed reminding this year.

wireless network globe - internet of things edge [IoT] - edge computing

Can blockchain make IoT faster and more secure?

Blockchain technology will allow IoT devices to truly become autonomous – exchanging data, executing actions, and improving their own processes – all without any kind of centralized authority.

Load More