Information Security

Information Security news, analysis, how-to, opinion and video. | CIO

European Union [EU] flag-lock on top of a map of Europe
business people conference room collaboration boardroom

SHEp17
video

Spectre and Meltdown | Salted Hash Ep 17

What is it about the Spectre and Meltdown attacks that scared everyone so much? Host Steve Ragan and J.M. Porup talk through the impact of these hardware flaws.

access computer through your phone skeleton key unlocking

Establishing role-based access control in the workplace

Access control is necessary, and every organization must implement it in some form.

cyber kill chain
video

What is the cyber kill chain?

Concerned about your network defense? Watch this short video to learn the 7 stages of the cyber kill chain, a framework created by Lockheed Martin to outline the phases of a targeted cyberattack.

puzzle pieces problem solved teamwork collaboration

CIO 2020: Greater collaboration, and an end to control-based security

Given the meteoric rise in the number of security breaches in recent years, CIOs and CISOs need to be highly aligned and collaborative around every corporate initiative.

facial recognition - biometric security identification

Could a digital identity network prevent the next Equifax-like breach?

A military veteran equipped with a Harvard MBA launches digital identity startup to protect against future Equifax cyberattacks.

johann sebastian bach stamp

5 things J. S. Bach can teach you about information security

What can a centuries-old classical music composer teach today's CIOs about infosec? Plenty, it turns out...if you'll only listen.

container technology

Best practices for a secure and trustworthy container platform strategy

Container technology has a direct impact on the agility of a software development team and consequently have seen a huge increase in interest, adoption and usage.

passport stamps

Blockchain IDs need international consensus

Just as they agreed on the booklet format of a passport and the information included within, they must also do so for the next generation of IDs.

hammer 154045038

Looking for nails to hit with my blockchain hammer

A Q&A with Adventium blockchain expert T.D. Smith

Google self driving car

How blockchain is hastening the advance of autonomous cars

Blockchain is quickly achieving parity between human and robotic drivers, and should soon accelerate self-driving solutions into the realm of statistical perfection.

eye on computer monitor showing privacy security or breach

EU privacy law says companies need to explain the algorithms they use

Explainable AI is needed to fully comply with the new EU data protection law. But companies don't need to sacrifice the benefits of machine learning accuracy to do it.

woman leader hipster execs diversity

Cybersecurity is every IT leader’s job

October is National Cyber Security Awareness Month, and is supposed to remind us of the magnitude of the growing cybersecurity threat. As if we needed reminding this year.

wireless network globe - internet of things edge [IoT] - edge computing

Can blockchain make IoT faster and more secure?

Blockchain technology will allow IoT devices to truly become autonomous – exchanging data, executing actions, and improving their own processes – all without any kind of centralized authority.

Hacking stealing password data.

4 ways to halt data thieves

Small- to medium-sized businesses struggle to reduce the complexity of cyber security management while maintaining defenses against a growing threat landscape. All security professionals and solution providers will agree that...

cyber attack virus meltdown

6 reasons why organizations need to boost their cyber-resilience

Despite skyrocketing cyber-security spending, 81% of CISOs still worry that data breaches remain unaddressed.

3 sensitive data hacker phone

Whose fingerprints are all over your customer data?

When compared to data warehousing, the data lake paradigm is incredibly appealing. But until you start working with the data, you don’t know what you don’t know. And that can be fatal.

VMware headquarters

How VMware is re-thinking security for the cloud era

With breaches making headlines around the world, the IT marketplace is looking for new ways to protect applications and data. With App Defense, VMware has built a security product with virtualization in mind.

mobile security data protection [Thinkstock]

5 ways you could avoid and prepare for cyberattacks in your organization

Preparing for any potential cyberattack is an increasingly important precautionary steps in every organization. Here's how your team could do it without disrupting existing processes.

Load More