Assessing and Managing Risk
Threats and Vulnerabilities
(ISC)2 Board Chairman Wim Remes, who is seeking re-election, details the organization's management changes and efforts to boost member engagement in this interview.
Sarbanes-Oxley Act compliance is important for firms to maintain. Expert Mike Chapple explains how to keep up with the new whistleblower update.
Industry observers say the unveiling of the Regin malware, which came after more than half a decade in the wild, highlights the need for better detection methods.
While the interest in desktop as a service has grown, there are a number of security concerns enterprises should also be aware of. Expert Ed Moyle discusses the risks and rewards of desktop as a service.
Newly announced Amazon Web Services security features include an encryption key management service intended to boost cloud security and strengthen appeal of AWS to enterprises.
This IaaS management quiz will test what you have learned from the tip, videos and podcast in this Cloud Security School.
With an IBM partnership yet to materialize, Apple wants enterprises to buy into its products, but whether it offers solid IT support and services remains to be seen.
BlackBerry's return to QWERTY keyboard devices and improvements to BES 12 are steps in the right direction, but is it too little, too late for many IT shops that have already moved on?
Android's popularity makes it a prime target for hackers and attackers. Fortunately, there are plenty of security features to keep devices safe.
RSA researchers say the costly Pandemiya banking malware was written entirely from scratch, a dangerous oddity in the world of malware.
PayPal's Michael Barrett says many firms fear misuse of shared cybersecurity data. He also discusses the evolution of PCI DSS and mobile payment security.
A cybergang in Eastern Europe revealed plans to attack U.S. banks with a Gozi-like Trojan, according to RSA.
Smartphone and tablet use in the enterprise can help boost productivity, improve employee satisfaction and lower costs. However, it is also fraught with risk. Expert Lisa Phifer discusses the risks and rewards of going mobile in the enterprise.
Bring your own device has a number of inherent security challenges. Expert Lisa Phifer explains how a mobile device management product can help your enterprise conquer BYOD risks.
Cloud-based data loss prevention can be a worrisome option for some. Kevin Beaver explains how to measure the risk vs. reward of cloud-based DLP.
Detecting fake websites needs to be part of all companies' security strategies, according to security and domain name experts.
WordPress is the most attacked web application and websites that run the content management system (CMS) are attacked 24% more often than those using alternative systems.
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
IT bosses say 69% of UK staff bring wearables into their organisations, according to a survey by Trend Micro
Nottingham University Hospitals NHS Trust used Cisco video technology to enhance care quality at a dedicated facility for cystic fibrosis patients
Email is one of the earliest services created on the internet and, arguably, remains the most important