Cyber security's image problem has created a diversity nightmare
The cyber security industry has an image problem which is turning off capable candidates from pursuing careers in the profession.
The cyber security industry has an image problem which is turning off capable candidates from pursuing careers in the profession.
USB hubs found to leak information to external devices thanks to a kind of electronic "crosstalk" between connected components.
The minute you outsource responsibility or governance of information security to a third party, you tie a noose around your neck and hand the end of the rope to a vendor.
CISOs have accused an events company of implying they were confirmed attendees at an upcoming summit when this wasn’t the case.
A declining number of C-suite executives are aware of the laws around storing confidential data, according to a survey.
Take some time in the early days of 2014 to improve the computer setup in your home office or small business. These security, networking, storage and productivity tips will help you work faster once you get back to business as usual.
For years, information security experts have predicted a spike in mobile malware. Will 2013 be the year of mobile attacks? And what other security threats are on the horizon?
If the economic downturn has proven anything, it's that many CISOs still struggle to articulate the value of their security programs and justify the security budget to business and executive management. Many helplessly watched their budgets slashed, their projects postponed, and their employees laid-off.
Share this IBM Security Services white paper with your clients to help them outline a strategic approach to selecting an MSSP and establishes the 10 most important qualifications to consider in choosing a provider. The right MSSP can reduce the cost and complexity of information security while building a stronger security posture.