"Align technology with businesses" is an old phrase. But information security is now part of this change, making strides to align with growth as a business enabler. Enter: the converged technology operations center.
After the complete collapse of network security at Sony Pictures - in the wake of its data breach - it's important that we highlight some of the organization's fundamental security mistakes. Here's a macro view of the lessons we must all learn.
Organizations in all business sectors should take a series of steps to guard against "visual hacking," a low-tech method used to capture sensitive, confidential and private information for unauthorized use.
A colleague suggested we might experience yet another crisis in trust when consumers and merchants realize that EMV does not solve all their problems. I find it timely to talk about the limitations of EMV.
Target needs someone who is up for the challenge of evaluating the entire security landscape of the global retail giant, asking tough questions, making changes to mitigate risk - all to help earn back trust.
With the White House set to issue its cybersecurity framework next month, a former CIA chief information security information officer vividly explains why the set of best IT security practices won't necessarily protect the nation's critical infrastructure.
Termination of an employee after a breach should be reserved for repeat offenders, individuals who show a total disregard for the rules, those who seek to harm another or the most egregious incidents, security expert Mac McMillan contends.
Improving collaboration among employees is the goal of Yahoo CEO Marissa Mayer's decision to ban telecommuting, but her edict means better information security as well, writes veteran CISO Patricia Titus.