In this special issue, we are revealing the winners of our Security 7 awards. Discover which
outstanding information security professionals were recognized for their contributions.
Audit and compliance planning, Choosing security services, End user training and awareness, Risk assessments and metrics, Writing and enforcing security policies
Microsoft Windows configuration and patch management, Microsoft endpoint security management, Microsoft identity and access management, Microsoft security integration and centralized management, Microsoft security threat management
Detecting and preventing network intrusions, Integrating security into networks, Managing firewalls, Network access controls, Wireless network security management
Antivirus, antispyware management, Configuration and patch management, Integrated security appliances and systems, Security vulnerability management
CISOs need buy-in from the top down to build successful software security programs.
The career is only now defining itself.
Building on what cybercriminals began, security services from many countries have the capability to attack and steal for their national interests.
A recent study from the Cloud Security Alliance shows strong support for global data privacy standards as well as a consumer bill of rights, but there are major obstacles for privacy in the cloud.
Security pros from Hewlett-Packard and SkyHigh Networks offer insight on how to identify shadow cloud apps and services within the enterprise.
Implementing data encryption controls in a cloud environment can be quite challenging for organizations using those services. Ed Moyle discusses the first two steps to implementing data security in the cloud.
How does Citrix's Brian Dye see his company withstanding pressure from VMware as it seeks new mobile innovations?
New mobile startup Talko from tech pioneer Ray Ozzie takes a consumerization-based approach to voice communications, but will it attract IT?
Rooting an Android smartphone or tablet makes the device more vulnerable to malicious apps that could wreak havoc on a corporate network. MDM alone can't stop the threat.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Security budgets in Australia are soaring as hacking incidents become increasingly common.
Throwing a curve: Is there a potential weakening of security products and services courtesy of the NSA and RSA BSafe?
New survey shows the battle between corporate-issued devices versus personally owned smartphones and tablets is too close to call.
Ebay has removed malicious links in a listing for iPhones that diverted to a phishing site designed to steal user credentials.
US retailer Home Depot is investigating a possible data breach of customer payment card information that is potentially greater than the Target breach.
In an advisory, the U.S. government estimated that the Backoff point-of-sale malware campaign has struck over 1,000 businesses to date.
Hospitality firm Sunborn picks Mitel 3300 IP Communications platform for London's first floating hotel
UK mobile carriers sign up to carrier billing service to enable consumers to make physical purchases with a mobile phone
Ofcom chief executive Ed Richards is to stand down at the end of December 2014, says the telecoms regulator