Security

Security | News, how-tos, features, reviews, and videos

program dirty 2018.05.08 13.24.34.00 15 19 43.still001
video

Mingis on Tech: Reflections on RSA 2018

This year's RSA security conference focused on a variety of cybersecurity topics – everything from blockchain to the looming GDPR rules. CSO's Steve Ragan was there and offers insights on what he learned.

template c100.00 00 48 08.still001
video

Countdown to the GDPR deadline: Are you ready? | Salted Hash Ep 28

Host Steve Ragan reports from the RSA 2018 show floor, talking with Greg Reber, founder and CEO at AsTech Consulting, about the looming GDPR deadline and what IT security professionals should be getting done now.

smiley face

What #GDPRjokes tell us about the coming regulations

A glimpse inside the humor of GDPR’s impact on storing and controlling data.

Will LaSala
video

Defending against mobile technology threats | Salted Hash Ep 24

What are the current dangers in mobile technology and what are the strategies to keep yourself protected? Join host Steve Ragan from the show floor at RSA 2018, where he talks with Will LaSala, director of Security Solutions and...

Facebook

The Facebook debacle shouldn’t swing the pendulum toward data overprotection

A deeper dive into controlling and protecting data in the wake of Facebook’s “Cambridge Analytica scandal” and the unintended consequences of lost access from higher standards. Enterprises should address the trade-offs up front as...

next generation firewalls
video

How have network firewalls evolved?

Firewalls have become ubiquitous across the enterprise IT landscape because of their proven ability to stop bad traffic from entering corporate networks and protect a company’s most valuable assets. So how have firewalls evolved over...

outsourcing suitcase with travel stickers at edge of dock

What you must know about business travel in an age of surveillance and censorship

As the number of gaps in employee device hardware and software mushrooms, CIO looks at enterprise best practices that mitigate catastrophic risk or prevent harm altogether.

executive looking over cliff with large gap

How to manage IT risk without killing innovation

Success in managing the hidden risks of new initiatives will buy you credibility to invest further in innovation.

program dirty 2018.04.23 12.03.07.00 07 37 15.still001
video

Mingis on Tech: The lowdown on Android security

Google's Android OS sometimes gets unfairly maligned as being weak on security. Computerworld blogger JR Raphael explains why that's a misconception and how users can keep their devices safe.

industrial supply chain management - ERP - Enterprise Resource Planning

Today’s competitive digital marketplace will drive policy changes

After the Facebook hearings policymakers should remember that there’s plenty of room for new players in the digital marketplace

internet tubes

Internet exchange points team up to bring better MANRS to the internet

Enterprises stand to benefit from ISOC's latest campaign to get IXPs to clean up internet routing security

Israel Barak
video

Honeypots and the evolution of botnets | Salted Hash Ep 23

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Israel Barak, CISO at Cybereason, about his firm's recent honeypot research, which gathered information showing how the bot landscape is evolving.

adrian sanabria
video

Is it time to kill the pen test? | Salted Hash Ep 22

Host Steve Ragan reports from the show floor at RSA 2018, talking with guest Adrian Sanabria, director of research at Savage Security, about de-emphasizing network penetration tests to put more focus on attack simulations and helping...

geek with candle lost in binary background big data data scientist

Shed light on your dark data before GDPR comes into force

Somewhere, hidden in the depths of your business, lies a threat you may never have considered. Lurking in the shadows, it silently multiplies beyond your control. It threatens your business’ security and could cost you dearly under...

running shoes runner

The role of the Quantified Self in a corporate environment and what it means for IT

Tracking employee health data can yield benefits ... and create issues for IT.

business alignment partnership collaboration

State of the CIO, 2018: IT-business alignment (finally) gets real

After years of casual courting, IT and business are finally forging effective ways of working together to pursue shared objectives for digital transformation.

European Union [EU] flag and binary code

Comply today and realize value tomorrow: GDPR readiness day one and beyond

This blog is dedicated to detailing the capabilities your organization needs to comply with General Data Protection Regulation (GDPR) and, eventually, to operationalize and enhance your privacy compliance and processes.

European Union [EU] flag and binary code

GDPR is coming. Are you ready?

Regulators will begin enforcing the European Union's General Data Protection Regulation on May 25. Here are steps you can take to make sure your compliance program is ready.

10 global policy

Artificial intelligence policymaking is alive and well in Paris and Brussels

The good news is that European policymakers are responding to the challenges posed by artificial intelligence (AI).

number five

5 must-ask questions for complying with GDPR’s ‘Right to be Forgotten’

For all US-based companies that might have EU data, it’s time to segregate that data and initiate proper protocols to ensure fines don’t come your way after May.

Load More