Security

Security | News, how-tos, features, reviews, and videos

mobile device management

Open source mobile operating systems need to control fragmentation

The history of failed operating systems has a lesson for today’s competition policy regulators.

Network World: IoT Hacks [slide-06] > Lateral Attacks > Network access via a single breach point

$660,000 data privacy fine highlights dangers for businesses dabbling in politics

A year into an investigation into the use of data analytics in political campaigns, the U.K.’s privacy watchdog is hitting companies that shared data with political parties with sanctions including a criminal prosecution and a...

flextronics

Flex strengthens supply chain with IAM

An identity and access management solution helps the technology company provision and deprovision identities for thousands of employees and supply chain partners, allowing CIO Gus Shahin to move on to more strategic efforts, including...

GDPR, legal, European Union

The GDPR and the effect on US ad tech

The GDPR has been in effect since May 25. Discover the impact this new legislation has had on the U.S. ad tech industry and what it means for the future of targeted online marketing and marketing automation.

government cios without authority washington columns executives

Open government data is essential, but policies should not discourage public-private data partnerships

Policymakers must craft sensible policies to ensure the public and private sectors can continue collaborating for the benefit of government and its citizens.

risk assessment - safety analysis - security audit

Workday transforms risk management into strategic advantage

Workday's home-grown risk management tool offers a strategic boost by facilitating communication between security teams and business leadership.

template c100.00 09 23 04.still001
video

Getting hands-on with industrial control system setups at RSA | Salted Hash Ep 31

Host Steve Ragan is joined on the RSA 2018 show floor by Bryson Bort, CEO and founder of SCYTHE, to talk about the ICS Village, where attendees can learn how to better defend industrial equipment through hands-on access to the...

icann whois

ICANN’s Whois service faces GDPR compliance challenges

Legal uncertainties shutter previously accessible databases used to identify fraudsters, criminals, thieves and hackers.

template c100.00 08 17 21.still001
video

How the Spanish cybercriminal underground operates | Salted Hash Ep 30

Host Steve Ragan reports from the RSA 2018 conference, talking with Liv Rowley, an intelligence analyst at Flashpoint, about Spanish cybercrime, an underground community that poses persistent security risks.

gdpr

GDPR is a missed opportunity for real privacy protection

Doubling down on individual control makes GDPR an expensive nuisance for enterprises while failing to protect consumers against likely data harms.

template c100.00 00 52 07.still001
video

Learn what the 'zero trust' security model really means | Salted Hash Ep 29

Host Steve Ragan reports from RSA 2018 conference, talking with Wendy Nather, director, advisory CISOs at Duo Security, about how organizations can build a zero trust model, including consistently authenticating users.

protected key within a secured network

4 most in-demand cybersecurity skills

As cyber attacks continue to increase in number and escalate in complexity, companies are looking to hire hard-to-find cybersecurity experts to help secure their needs. Here’s a look at the four most in-demand cybersecurity skills for...

GDPR, legal, European Union

Now that it’s here, what can we learn from the bumpy journey to GDPR compliance?

Think you’re done with hearing about GDPR? Not so fast. Data privacy legislation isn’t going anywhere and there’s a lot we can learn from the ups and downs of the EU experience.

insurance policy

Cyber insurance: Is it worth the investment?

While cyber liability insurance policies are complex and proving claims can be daunting, CIOs in the midmarket space agree access to resources make the investment worthwhile.

1 the state of it security 2018 intro

The state of IT security, 2018

Who's in charge of IT security? To whom do they report? How big is their budget? We've got answers.

template c100.00 02 54 15.still001
video

TSB phishing attacks | Salted Hash Ep 33

TSB customers in the U.K. were already frustrated by the bank's technical problems, but now the situation has gotten worse as criminals take advantage of the chaos. Host Steve Ragan looks at recent TSB phishing attacks and the kit...

GDPR, legal, European Union

CRM and GDPR: 8 points you may have missed

Today is the first day of the rest of your life … or at least of the endless process of GDPR compliance. Your customer relationship management (CRM) and marketing automation systems are ground zero for GDPR issues, but that’s not all....

CSO slideshow - Insider Security Breaches - Flag of China, binary code

China and the West are converging on consumer data protection policy

As the EU’s General Data Protection Regulation comes into force on May 25, China is also wrestling with the complex consumer protection issues that bedevil all digital economies.

template c100.00 01 18 00.still001
video

How deception technologies use camouflage to attract attackers | Salted Hash Ep 26

Host Steve Ragan reports from the show floor at RSA 2018, where talks with Chris Roberts, chief security architect at Acalvio Technologies, about the benefits and misconceptions of deception technologies.

tech talk opening.00 14 30 21.still001
video

Tech Talk: Prepping for GDPR

CSO's Michael Nadeau and Steve Ragan join Computerworld's Ken Mingis and IDG Communications' Mark Lewis to look at what the new EU privacy rules mean. They offer insights on how companies can prepare – and what happens if they don't.

Load More