The volume of spam messaging is down, but the bogus messages that are getting through? They're more malicious than ever, says Cisco's Jason Brvenik. He shares insights from Cisco's 2015 Security Report.
What are the top security priorities for healthcare's "CIO of the Year"? Bolstering defenses against phishing, malware and remote attacks head the list, says Sue Schade, CIO at the University of Michigan Hospitals and Health Centers.
A new federal cyberthreat intelligence center could help the government build more resilient networks and better identify cyber-attackers, leading to arrests and punishments, says Harry Raduege, a former top Defense Department IT leader.
The Anthem breach, which possibly started with a phishing campaign, is a prime example of how hackers are perfecting their schemes to target key employees who have access to valued information, says Dave Jevans of the Anti-Phishing Working Group.
As hack attacks, such as the breach of Anthem Inc., become more common, it's more critical than ever for organizations to carry out an "adaptive defense model" to protect sensitive information, says Dave Merkel, chief technology officer at FireEye.
PINS can effectively reduce card-not-present as well as card-present fraud, argues Liz Garner of the Merchant Advisory Group, who will be a featured speaker at Information Security Media Group's upcoming Fraud Summit Los Angeles.
As a result of the explosive growth in worldwide use of smart phones, mobile malware will play a much bigger role in fraud this year, predicts Daniel Cohen, a threat researcher for RSA, which just released its 2014 Cybercrime Roundup report.
Target is the high-profile example, but many organizations have been breached through third-party vulnerabilities. Where are the security gaps, and how can they be filled. BitSight's Stephen Boyer offers insight.
Recognizing the behavior of an intruder, rather than relying on digital signatures, will prove to be a better way to prevent hackers from pilfering data and creating havoc in IT systems, says Radware CEO Roy Zisapel.
Data breaches are inevitable, hence it's up to executives to ensure their enterprise is secured, without trying to encrypt everything, warns Prakash Panjwani, president and chief executive officer of SafeNet.
Texas Chief Information Security Officer Brian Engle, like other CISOs, has voiced concerns that the state government didn't have sufficient staffers and managers with the right set of IT security skills. Engle, however, did something about it.
The increase in sophisticated hacking attacks will lead other sectors to follow the lead of the financial services industry in implementing multifactor authentication, says Ken Hunt, CEO of VASCO Data Security International.
CISOs are moving from being entrenched in technology issues to becoming more involved in top-level business matters, which requires new skills, says George McCulloch, who leads the new Association for Executives in Healthcare Information Security.
To help protect health data as cyberthreats evolve, healthcare CIOs must roll out a "blended strategy" for security, says Charles Christian, new chairman of the College of Healthcare Information Management Executives, an association of CIOs.