Security by Discomfort
News Analysis 10/12/2017 3 comments
If you want to bridge the talent gap, look beyond the usual pool of corporate candidates to fill infosec positions.
Unpacking Packed Malware
News Analysis 8/24/2017 1 comment
Executable compression is a common technique for hiding malware. The question is, what can you do to unpack the threat?
Personal Security Begets Enterprise Security
News Analysis 7/20/2017 2 comments
Employees' personal approach to information security is fundamentally crucial to their organizations' security posture. Accordingly, enterprises would do well to learn from recent hacks and rethink the way they train their employees in cybersecurity matters.
The Stress of Being CISO
News Analysis 7/3/2017 3 comments
The title 'CISO' carries with it some serious stress. A new poll talks about that stress and what to do about it.
Autonomous Cars Must Be Secure to Be Safe
News Analysis 6/13/2017 29 comments
All of the airbags and crumple zones in the world won't help if hackers can take control of self-driving cars. What can manufacturers do to keep these next-generation vehicles secure and safe?
The Security of SD-WAN
News Analysis 6/5/2017 Post a comment
With Software-Defined WAN (SD-WAN), lower costs and increased efficiency are the big payoffs. Is there a price to be paid in security?
Security, Cloud & the SBC
News Analysis 3/27/2017 Post a comment
Despite all the current hype surrounding 5G at the moment, it's cloud and security technologies that are fundamentally driving business growth opportunities for communications service providers.
Pay-TV Security Gets 50 Shades Darker
News Analysis 3/2/2017 Post a comment
Pay-TV providers are seeing new security threats and vulnerabilities every day, and are facing numerous challenges trying to tighten the security that protects organizations, as well as their customers.
Nokia's Efforts to Lead in Security
News Analysis 2/2/2017 Post a comment
Nokia is maintaining its strategic emphasis on network security and may have some plausible claims to be ahead of its major vendor rivals – but it still has a lot of questions to answer.
The news from Uber is rippling across the business landscape. Executives and leaders have a variety of responses to the breach and its aftermath. Here's a roundup of some of those reactions.
If your personal information is available on the Internet, you should assume that a hacker has it.
Facial recognition is starting to grow as a technology on consumer devices; what does that mean for your enterprise security?
An industry alliance has introduced Quad9, a free DNS service that can protect users from phishing, bots and malware websites.
A cautionary note for the season in this week's Friday Haiku.
You can't so much as go to a coffee shop today without hearing the word 'blockchain.' Hearing about a useful blockchain is less common, but ...
Last year, 60 million companies changed owners worldwide. That turnover makes it incredibly difficult to avoid doing business with entities (e.g., ...
Keith Furst of Data Derivatives interviews Daniel Wagner, author of a new book, Virtual Terror: 21st Century Cyber Warfare. They discuss the ways ...
Facebook has introduced new measures that will enable users to secure access to their accounts using a physical 'key' application.
An interview with Steve Grobman, CTO of McAfee